Professor Busch's CFS Resources
Security+ Practice Exam 1
Initializing search
Professor Busch's CFS Resources
Welcome (Start Here)
About
About
Whoami
About This Repository
Content Philosophy & AI Transparency
CompTIA Prep
CompTIA Prep
Security+ SY0 701
Security+ SY0 701
CompTIA Security+ SY0-701: Sub-Domain Practice Exams
Getting Started & Tips
Security+ Practice Exam 1
Security+ Practice Exam 2
Hands on Activities
Hands on Activities
Activity: VPN Site-to-Site Configuration
eBooks
eBooks
CFS137
CFS137
CFS137 Interactive Activities
CH1: Intro to Digital Forensics
CH2: Overview of Computer Crime & Threat Landscapes
CH3: Acquisition, Chain of Custody, & Forensic Reporting
CH4: File Systems & Data Recovery
CH5: Windows Registry Forensics
CH6: Windows System Artifacts
CH7: Internet Browser Forensics
CH8: Windows Memory Forensics
CH9: Email Forensics
CH10: Anti-Forensics & Data Hiding
CH11: Linux Forensics
CH12: macOS Forensics
CH13: Mobile Forensics
CH14: Cloud Forensics and Social Media Investigations
CFS250
CFS250
CH1: The Business of Cyber
CH2: Cyber Job Roles and Responsibilities
CH3: The Skills Inventory – Mapping Your Arsenal
CH4: Resume Engineering
CH5: Personal Branding
CH6: Certifications and Continuous Learning
CH7: Soft Skills and the Behavioral Interview
CH8: The Technical Interview — SOC & Digital Forensics
CH9: The Technical Interview — Governance, Risk & Compliance
CH10: The Human Side of the SOC — Mental Health, Burnout, and Building a Sustainable Career
CH11: Salary Negotiations — Knowing Your Worth and Communicating It
CFS256
CFS256
CFS256 Interactive Activities
CH1: Introduction to Risk Management and Contingency Planning
CH2: Business Continuity and the Business Impact Analysis (BIA)
CH3: Disaster Recovery Planning
CH4: Crisis Management
CH5: IR Fundamentals and the CSIRT
CH6: IR Preparation Phase
CH7: IR Detection Phase
CH8: IR Analysis Phase
CH9: Containment Strategies
CH10: Eradication & Remediation
CH11: Recovery & Post-Incident Activity
CH12: Ransomware Playbook
CH13: Social Engineering & Insider Threat Playbooks
CH14: Proactive Operations - Threat Hunting
CFS257
CFS257
CH1: Introduction to Windows Forensics
CH2: Forensic Concepts, Legal Frameworks, and Process
CH3: Creating Forensic Images and Evidence Acquisition
CH4: Windows Registry Forensics – Part 1
CH5: Windows Registry Forensics – Part 2
CH6: Windows File Artifacts
CH7: Windows Shadow Copy (VSS) Forensics
CH8: Windows Memory Forensics – Part 1
CH9: Windows Memory Forensics – Part 2
CH10: PowerShell Forensics
CH11: Web Browser Forensics
CH12: Email Forensics
Chapter 13: Cloud Forensics — Microsoft Azure and OneDrive on Windows
Chapter 14: Data Hiding Techniques in Windows
CFS280
CFS280
CH1: Defining Mobile Forensics and Standards
CH2: The Legal Process
CH3: Triaging Mobile Evidence & Report Writing
CH4: Cellular Networks and Subscriber Identity
CH5: Mobile Device Architectures & The Boot Process
CH6: Acquisition Methodologies
CH7: Timestamps and File Carving
CH8: SQLite Database Forensics
CH9: Android Forensics — File System and Evidence
CH10: Android Applications and Security
CH11: iOS Forensics - Architecture, Evidence, and Acquisition
CH12: Logical and Manual Examinations
CH13: App Artifacts and Third-Party Evidence
CH14: Advanced Physical Acquisition
CFS287
CFS287
Week 7 Addendum: Detecting Web Attacks
CFS287 Interactive Activities
Week 12: Investigating and Analyzing Logs
Security+ Practice Exam 1