JavaScript required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
Gallery
Cyber Security and Networking Course
1. The Internet
2. Network model and technology
3. Cybers Attack Types
4. Hardware, Software and Physical security
5. Risk Reduction
6. Introduction to Cryptography (Lab)
7. Digital Forensics
8. Lab
9. Access Control and Authentication
10. Personal Security
More
Share
Explore
7. Digital Forensics
learn this if you don’t want to get caught
Steps in Digital Forensics
Evidences identification
Irregularity in log files
Firewall reported attack
Capture Evidences
Capture Techniques
Disconnect from Internet
Isolate attacked machine
Evidence Analysis
Steganography
Log Analysis
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.