diff --git a/README.md b/README.md index 88445d6..bef86da 100644 --- a/README.md +++ b/README.md @@ -23,6 +23,8 @@ - [Linux Command Line Tutorial](/Basic_Computer_Skills_for_Forensics/3_Linux_command_line_tutorial.pptx) - [Advanced Linux Command Line Tutorial](/Basic_Computer_Skills_for_Forensics/4_Advanced_linux_command_line.pptx) - [Introduction to Digital Forensics](/Basic_Computer_Skills_for_Forensics/5_Introduction_to_digital_forensics.pptx) + - [Sleuth Kit Tutorial](/Basic_Computer_Skills_for_Forensics/6_Sleuth_Kit_Tutorial.pptx) + - [USB Image Acquisition](/Basic_Computer_Skills_for_Forensics/7_USB_Image_Acquisition.pptx) - Case Study - [Investigating P2P Data Leakage](#Investigating-P2P-Data-Leakage) (added on June 2021) - [Investigating NIST Data Leakage](#Investigating-NIST-Data-Leakage) @@ -112,14 +114,12 @@ The [case study](https://github.com/frankwxu/digital-forensics-lab/tree/main/Ill | Labs | Topics Covered | Size of PPTs | | ----- | -------------------------------------------------------------------- | ------------ | -| Lab 0 | Intro USB_Image_Acquisition | 2M | -| Lab 1 | Intro The Sleuth Kid Tutorial | 1M | -| Lab 2 | HTTP Analysis using Wireshark (text) | 3M | -| Lab 3 | HTTP Analysis using Wireshark (image) | 6M | -| Lab 5 | Rhion Possession Investigation 1: File recovering | 9M | -| Lab 6 | Rhion Possession Investigation 2: Steganography | 4M | -| Lab 7 | Rhion Possession Investigation 3: Extract Evidence from FTP Traffic | 3M | -| Lab 8 | Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic | 5M | +| Lab 0 | HTTP Analysis using Wireshark (text) | 3M | +| Lab 1 | HTTP Analysis using Wireshark (image) | 6M | +| Lab 2 | Rhion Possession Investigation 1: File recovering | 9M | +| Lab 3 | Rhion Possession Investigation 2: Steganography | 4M | +| Lab 4 | Rhion Possession Investigation 3: Extract Evidence from FTP Traffic | 3M | +| Lab 5 | Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic | 5M | ### Investigating Email Harassment