Topics Covered
- Incident Response
- Timeline Analysis
- Tool Validation and Anti-Forensics
- Forensic Analysis of Databases
- Network Forensics: Log Analysis
- Network Forensics: Proxy Analysis
- Network Forensics: Traffic Pattern Analysis
- Fraud and Abuse Act: Digital Forensics
- Network Forensics: Investigating Attacks
- Forensics Science and Courtroom Science
- Conducting Forensics Analysis Without Violating Privacy: Law Perspective
- Setting Standards; Independent Research Culture
- Operating Systems Analysis
- Using DF to Prosecute Computer Crime in Real Life
- Network Forensics for Exploits
- Malware Traffic Analysis
- Extracting Malware from Email
- Psychology of Hackers
- Classification of Cyber Criminals
- Malware Analysis
- IDA
- Reverse Engineering
- Reasoning of Digital Forensics