The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
In this course, you will investigate compromised Linux machine, create a timeline from evidences found on victim’s host and analyze the malware with a wide range of tools including databases such as MYSQL and Elastic Stack.
Data Acquisition from suspect’s computer.
Data integrity as part of the forensics process
Incident Response (IR) Methodology
Linux live analysis
Post mortem analysis using Elastic or MySQL
IR process – from Incident to report
Senior level in Linux and Networking (TCP/IP)
IR people who wish to expand their knowledge
Part 1: Forensics Methodology