The Art of DFIR Training
Deep dive of what we can do with Shell Items on windows
Understanding how we can perform Forensics on network captures using Wireshark tool
Understanding how SIEM Works
Analysis of CyberGate RAT
Understanding how to forensically analyze Google Drive
understanding how Registry works in windows and how to analyze it
understanding how Event logs work in windows and how to analyze them
How to write a good YARA Rule