-
Forensic Pre-requisites
6-
Lecture1.1
-
Lecture1.2
-
Lecture1.3
-
Lecture1.4
-
Lecture1.5
-
Lecture1.6
-
-
Digital Media Forensics (Tool - WinHex)
5-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
Lecture2.5
-
-
Applied Forensics (Tool - Load Point Utility, Browser History View, Userassist, Last Activity)
3-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
-
Network Forensics (Tools- Windump, Ethereal and Wirehshark)
7-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
Lecture4.6
-
Lecture4.7
-
-
Email Forensics
0No items in this section -
Cryptography and Data Hiding (Tools- PGP, Snow, S-tools, Camouflage)
4-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
-
Introduction to Information Technology Law
6-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
Lecture7.4
-
Lecture7.5
-
Lecture7.6
-
-
Forensic Documentation and Reporting
0No items in this section