Detailed Course Outline
- Introduction to forensic computing and incident response
 - Lifting of digital evidence and chain of custody
 - Filesystems & data recovery
 - Windows forensic
 - Unix & Mac Forensic
 - Memory forensic
 - Password cracking
 - Email investigation
 - Steganography and image analysis
 - Network forensic
 - Analysis and correlation of logs
 - Threat Hunting
 - Smartphones forensics
 - Creating an expert witness and expert report