Skip to content
Professor Busch's CFS Resources
CFS287 Interactive Activities
Initializing search
Professor Busch's CFS Resources
Welcome (Start Here)
About
About
Whoami
About This Repository
How Content is Created
License and Usage
CompTIA Prep
CompTIA Prep
Security+ SY0 701
Security+ SY0 701
CompTIA Security+ SY0-701: Sub-Domain Practice Exams
Getting Started & Tips
Security+ Practice Exam 1
Security+ Practice Exam 2
Hands on Activities
Hands on Activities
Activity: VPN Site-to-Site Configuration
eBooks
eBooks
CFS137
CFS137
CFS137 Interactive Activities
CH1: Intro to Digital Forensics
CH2: Overview of Computer Crime & Threat Landscapes
CH3: Acquisition, Chain of Custody, & Forensic Reporting
CH4: File Systems & Data Recovery
CH5: Windows Registry Forensics
CH6: Windows System Artifacts
CH7: Internet Browser Forensics
CH8: Windows Memory Forensics
CFS250
CFS250
CH1: The Business of Cyber
CH2: Cyber Job Roles and Responsibilities
CH3: The Skills Inventory – Mapping Your Arsenal
CH4: Resume Engineering
CH5: Personal Branding
CH6: Certifications and Continuous Learning
CH7: Soft Skills and the Behavioral Interview
CFS256
CFS256
CFS256 Interactive Activities
CH1: Introduction to Risk Management and Contingency Planning
CH2: Business Continuity and the Business Impact Analysis (BIA)
CH3: Disaster Recovery Planning
CH4: Crisis Management
CH5: IR Fundamentals and the CSIRT
CH6: IR Preparation Phase
CH7: IR Detection Phase
CH8: IR Analysis Phase
CFS257
CFS257
CH1: Introduction to Windows Forensics
CH2: Forensic Concepts, Legal Frameworks, and Process
CH3: Creating Forensic Images and Evidence Acquisition
CH4: Windows Registry Forensics – Part 1
CH5: Windows Registry Forensics – Part 2
CH6: Windows File Artifacts
CH7: Windows Shadow Copy (VSS) Forensics
CH8: Windows Memory Forensics – Part 1
CFS280
CFS280
CH1: Defining Mobile Forensics and Standards
CH2: The Legal Process
CH3: Triaging Mobile Evidence & Report Writing
CH4: Cellular Networks and Subscriber Identity
CH5: Mobile Device Architectures & The Boot Process
CH6: Acquisition Methodologies
CH7: Timestamps and File Carving
CH8: SQLite Database Forensics
CFS287
CFS287
Week 7 Addendum: Detecting Web Attacks
CFS287 Interactive Activities
CFS287 Interactive Activities
HTTP Log Analysis Simulator
CFS287 Midterm Review Activity