Week 1: Lecture

Anatomy of a malicious attack; Vulnerabilities and Exploits; Lockhart's principle; Evidence Collection

Tags:

Week 1: Practical

Basic investigation of a trojan infection

Tags:

Computer Evidence Collection

ACPO Guidelines on Computer Evidence

Tags:

Windows Registry

Forensic Analysis of the Windows Registry

Tags:

Windows Registry Quick Reference

Tags: