Core technical questions specific to digital forensics and evidence analysis.
Chain of custody, write blockers, evidence integrity
Bit-by-bit imaging, hash verification, multiple copies
Memory acquisition, live forensics, order of volatility
Detailed notes, photographs, timestamps, procedures
NTFS, FAT, ext4, file carving, deleted file recovery
Process analysis, network connections, malware detection
Packet analysis, traffic reconstruction, protocol analysis
Event correlation, timeline reconstruction, causality
iOS, Android, app data, location data, communications
Static analysis, dynamic analysis, sandboxing, reverse engineering
Password cracking, key recovery, encryption analysis
Cloud storage, API analysis, jurisdiction issues
Documentation, signatures, evidence tracking, custody logs
Report writing, testimony preparation, cross-examination
Search warrants, subpoenas, legal compliance
Technical writing, executive summaries, findings documentation
Real-world scenarios to test your practical forensics skills.
Evidence collection, timeline analysis, insider threat
Malware analysis, encryption analysis, recovery procedures
Smartphone analysis, app data, location tracking
Packet analysis, log analysis, attack reconstruction
Report writing, testimony preparation, legal procedures
Evidence presentation, technical explanation, courtroom procedures
Defense challenges, methodology defense, credibility
Lab procedures, quality assurance, case management
Essential tools and technologies every forensics analyst should know.