Course Curriculum

    1. Introduction

    2. Guided Questions

    3. Case Study Forensic Image

About this course

  • Free
  • 3 lessons
  • 0 hours of video content

Learning Outcomes

During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.

  • Investigating Windows Systems

  • Investigate User Process Execution Activity

Technical Requirements

For the hands-on labs in this case study

  • Any operating system of your choice

  • Internet Connection

  • Any tool of your choice

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates.

Thank You