Syllabus

Here’s the syllabus for this workshop:

  • Intro
    • Case Overview
    • Deliverable(s)
    • Outcome(s)
    • Workshop Slides

  • Tasks
    • Task #0: Preparing your environment
    • Task #1: Verification and Adding the Evidence
    • Task #2: Mounting the File System
    • Task #3: System Navigation and Timezone
    • Task #4: Users, Groups, Permissions, etc
    • Task #5: Checking System Logs
    • Task #6: Working with The Sleuth Kit (TSK)
    • Task #7: Data Recovery / File Carving
    • Task #8: Finding How the Threat Actor Gained Access

  • Quiz
    • Wrap Up Quiz

If you'd like to practice in CYBER 5W
pre-configured Virtual Lab environment

What is next at Cyber 5W?

Add your email to the mailing list to get the latest updates.

Thank You