mirror of
https://github.com/frankwxu/digital-forensics-lab.git
synced 2026-02-21 11:17:52 +00:00
add intro ppts
This commit is contained in:
16
README.md
16
README.md
@@ -23,6 +23,8 @@
|
||||
- [Linux Command Line Tutorial](/Basic_Computer_Skills_for_Forensics/3_Linux_command_line_tutorial.pptx)
|
||||
- [Advanced Linux Command Line Tutorial](/Basic_Computer_Skills_for_Forensics/4_Advanced_linux_command_line.pptx)
|
||||
- [Introduction to Digital Forensics](/Basic_Computer_Skills_for_Forensics/5_Introduction_to_digital_forensics.pptx)
|
||||
- [Sleuth Kit Tutorial](/Basic_Computer_Skills_for_Forensics/6_Sleuth_Kit_Tutorial.pptx)
|
||||
- [USB Image Acquisition](/Basic_Computer_Skills_for_Forensics/7_USB_Image_Acquisition.pptx)
|
||||
- Case Study
|
||||
- [Investigating P2P Data Leakage](#Investigating-P2P-Data-Leakage) (added on June 2021)
|
||||
- [Investigating NIST Data Leakage](#Investigating-NIST-Data-Leakage)
|
||||
@@ -112,14 +114,12 @@ The [case study](https://github.com/frankwxu/digital-forensics-lab/tree/main/Ill
|
||||
|
||||
| Labs | Topics Covered | Size of PPTs |
|
||||
| ----- | -------------------------------------------------------------------- | ------------ |
|
||||
| Lab 0 | Intro USB_Image_Acquisition | 2M |
|
||||
| Lab 1 | Intro The Sleuth Kid Tutorial | 1M |
|
||||
| Lab 2 | HTTP Analysis using Wireshark (text) | 3M |
|
||||
| Lab 3 | HTTP Analysis using Wireshark (image) | 6M |
|
||||
| Lab 5 | Rhion Possession Investigation 1: File recovering | 9M |
|
||||
| Lab 6 | Rhion Possession Investigation 2: Steganography | 4M |
|
||||
| Lab 7 | Rhion Possession Investigation 3: Extract Evidence from FTP Traffic | 3M |
|
||||
| Lab 8 | Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic | 5M |
|
||||
| Lab 0 | HTTP Analysis using Wireshark (text) | 3M |
|
||||
| Lab 1 | HTTP Analysis using Wireshark (image) | 6M |
|
||||
| Lab 2 | Rhion Possession Investigation 1: File recovering | 9M |
|
||||
| Lab 3 | Rhion Possession Investigation 2: Steganography | 4M |
|
||||
| Lab 4 | Rhion Possession Investigation 3: Extract Evidence from FTP Traffic | 3M |
|
||||
| Lab 5 | Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic | 5M |
|
||||
|
||||
### Investigating Email Harassment
|
||||
|
||||
|
||||
Reference in New Issue
Block a user