- Forensics fundamentals and Investigation Processes
- Data collection
- Data Identification, searching
- Data Acquisition and seizure
- Data duplication/ data carving
- Collecting digital evidence
- Incident handling
- Computer forensics tools
- File systems and hard-disk Forensics
- Hard drives, portable drives, CD, DVDs etc
- Multi partions , multi volume disks, server partions etc.
- FAT /NTFS/ext2/ext3 file systems
- Windows /Linux boot processes
- Virtual machines
- USB forensics
- Registry Forensics
- Steganography
- Digital image Steganography
- Steganalysis
- Image file forensics
- Audio file forensics
- Network forensics
- Analysis of network components logs
- Investigation network traffics
- Router forensics
- Using Snort , Wire shark as network forensics tools
- Investigating attacks, Investigating Internet crimes/web browsers forensics, investigation of Emails and email crimes
- Web attacks
- Dos attacks
- Social Networking
- Mobile forensics, Forensics/investigative reports, witnessing in court, ethics for forensics expert, existing cyber crimes laws of Pakistan, forensics process models, mobile forensics tools