Professor Busch's CFS Resources
Security+ Practice Exam 2
Initializing search
Professor Busch's CFS Resources
Welcome (Start Here)
About
About
Whoami
About This Repository
How Content is Created
License and Usage
CompTIA Prep
CompTIA Prep
Security+ SY0 701
Security+ SY0 701
CompTIA Security+ SY0-701: Sub-Domain Practice Exams
Getting Started & Tips
Security+ Practice Exam 1
Security+ Practice Exam 2
Hands on Activities
Hands on Activities
Activity: VPN Site-to-Site Configuration
eBooks
eBooks
CFS137
CFS137
CFS137 Interactive Activities
CH1: Intro to Digital Forensics
CH2: Overview of Computer Crime & Threat Landscapes
CH3: Acquisition, Chain of Custody, & Forensic Reporting
CH4: File Systems & Data Recovery
CH5: Windows Registry Forensics
CH6: Windows System Artifacts
CH7: Internet Browser Forensics
CH8: Windows Memory Forensics
CFS250
CFS250
CH1: The Business of Cyber
CH2: Cyber Job Roles and Responsibilities
CH3: The Skills Inventory – Mapping Your Arsenal
CH4: Resume Engineering
CH5: Personal Branding
CH6: Certifications and Continuous Learning
CH7: Soft Skills and the Behavioral Interview
CFS256
CFS256
CFS256 Interactive Activities
CH1: Introduction to Risk Management and Contingency Planning
CH2: Business Continuity and the Business Impact Analysis (BIA)
CH3: Disaster Recovery Planning
CH4: Crisis Management
CH5: IR Fundamentals and the CSIRT
CH6: IR Preparation Phase
CH7: IR Detection Phase
CH8: IR Analysis Phase
CFS257
CFS257
CH1: Introduction to Windows Forensics
CH2: Forensic Concepts, Legal Frameworks, and Process
CH3: Creating Forensic Images and Evidence Acquisition
CH4: Windows Registry Forensics – Part 1
CH5: Windows Registry Forensics – Part 2
CH6: Windows File Artifacts
CH7: Windows Shadow Copy (VSS) Forensics
CH8: Windows Memory Forensics – Part 1
CFS280
CFS280
CH1: Defining Mobile Forensics and Standards
CH2: The Legal Process
CH3: Triaging Mobile Evidence & Report Writing
CH4: Cellular Networks and Subscriber Identity
CH5: Mobile Device Architectures & The Boot Process
CH6: Acquisition Methodologies
CH7: Timestamps and File Carving
CH8: SQLite Database Forensics
CFS287
CFS287
Week 7 Addendum: Detecting Web Attacks
CFS287 Interactive Activities
Security+ Practice Exam 2