Course Curriculum
-
-
Introduction
-
Guided Questions
-
Case Study Forensic Image
-
About this course
- Free
- 3 lessons
- 0 hours of video content
Learning Outcomes
During this case you will learn how to investigate a system and locate evidence when the user encrypted some of their interesting files.
-
Investigating Windows Systems
-
Investigate User Process Execution Activity
Technical Requirements
For the hands-on labs in this case study
-
Any operating system of your choice
-
Internet Connection
-
Any tool of your choice
What is next at Cyber 5W?
Add your email to the mailing list to get the latest updates.