Skip to main content
Side panel
Technology-Enabled Learning Lounge
You are currently using guest access (
Log in
)
Computer Security, Forensics and Ethical Hacking
Learning Activity 1: Hackers and Hacking Process
Assignment
Learning Activity 1: Hackers and Hacking Process
◄ Unit 5: Ethical Hacking (PDF Format)
Jump to...
Jump to...
Course Learning Objectives
Course Structure
Course Assessment
Announcements
Unit 1: Introduction to Computer Forensics(PDF Format)
Report Writing: Cyber Crime
References & Further Readings
Unit Summary
Unit 2: COL Memory Forensics (PDF Format)
Learning Activity 1: Forensic Examiner
Learning Activity 2: Forensic Examination
References & Further Readings
Unit Summary
Unit 3: Computer Forensics Tools (PDF Format)
Learning Activity 1: File Recovery
Learning Activity 2: Forensic Investigation
References & Further Readings
Unit Summary
Unit 4: COL Investigation Process (PDF Format)
Learning Activity 1: Incidents
References & Further Readings
Unit Summary
Unit 5: Ethical Hacking (PDF Format)
Learning Activity 2: Malwares
Online Quiz: Ethical Hacking
References & Further Readings
Unit Summary
Submission Box
Learning Activity 2: Malwares ►
Computer Security, Forensics and Ethical Hacking
Home
Data retention summary
Get the mobile app