Skip to content

Commit b003de9

Browse files
authored
Update README.md
1 parent ceb8005 commit b003de9

File tree

1 file changed

+111
-1
lines changed

1 file changed

+111
-1
lines changed

README.md

Lines changed: 111 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,111 @@
1-
# certificate-intro-to-dfir-divide-and-conquer-sleuthkitlabs
1+
# 🔍 Intro to DFIR: Divide & Conquer (SleuthKitLabs)
2+
3+
![Course](https://img.shields.io/badge/Certificate-Intro%20to%20DFIR%20(SleuthKitLabs)-darkblue?style=flat-square&logo=sleuthkit)
4+
![Status](https://img.shields.io/badge/Status-Completed-brightgreen?style=flat-square&logo=verizon)
5+
![Type](https://img.shields.io/badge/Type-Digital%20Forensics%20%26%20IR-red?style=flat-square&logo=incident-io)
6+
![Focus](https://img.shields.io/badge/Focus-Disk%20Forensics%20%26%20Analysis-informational?style=flat-square&logo=magnify)
7+
![Maintainer](https://img.shields.io/badge/Maintainer-Nguyễn%20Vũ%20Thành%20Danh-blueviolet?style=flat-square&logo=github)
8+
9+
This repository contains **notes, labs, operations guides, and certificate of completion** for the *Intro to DFIR: Divide & Conquer* course by SleuthKitLabs.
10+
The course focuses on **digital forensics fundamentals, evidence handling, timeline analysis, and incident response** using SleuthKit and related tools.
11+
12+
---
13+
14+
## 📚 Notes
15+
16+
- 📄 [`01-introduction.md`](./notes/01-introduction.md) – Introduction to DFIR
17+
- 📄 [`02-target-research-osint.md`](./notes/02-target-research-osint.md) – OSINT for target research
18+
- 📄 [`03-pretexting-and-lure-design.md`](./notes/03-pretexting-and-lure-design.md) – Pretexting & lure design
19+
- 📄 [`04-delivery-infrastructure.md`](./notes/04-delivery-infrastructure.md) – Delivery infrastructure setup
20+
- 📄 [`05-delivery-techniques.md`](./notes/05-delivery-techniques.md) – Delivery techniques
21+
- 📄 [`06-opsec-foundations.md`](./notes/06-opsec-foundations.md) – OPSEC foundations
22+
- 📄 [`07-evasion-techniques.md`](./notes/07-evasion-techniques.md) – Evasion techniques
23+
- 📄 [`08-tracking-and-analytics.md`](./notes/08-tracking-and-analytics.md) – Tracking & analytics
24+
- 📄 [`09-red-team-phishing-lifecycle.md`](./notes/09-red-team-phishing-lifecycle.md) – Red team phishing lifecycle
25+
- 📄 [`10-reporting-and-lessons-learned.md`](./notes/10-reporting-and-lessons-learned.md) – Reporting & lessons learned
26+
27+
---
28+
29+
## 🔧 Operations
30+
31+
- ⚙️ [`01-evidence-handling.md`](./operations/01-evidence-handling.md) – Evidence handling procedures
32+
- ⚙️ [`02-filesystem-analysis.md`](./operations/02-filesystem-analysis.md) – Filesystem analysis
33+
- ⚙️ [`03-artifact-processing.md`](./operations/03-artifact-processing.md) – Artifact processing
34+
- ⚙️ [`04-timeline-construction.md`](./operations/04-timeline-construction.md) – Timeline construction
35+
- ⚙️ [`05-keyword-and-pattern-search.md`](./operations/05-keyword-and-pattern-search.md) – Keyword & pattern search
36+
- ⚙️ [`06-correlation-and-triangulation.md`](./operations/06-correlation-and-triangulation.md) – Correlation & triangulation
37+
- ⚙️ [`07-reporting-structure.md`](./operations/07-reporting-structure.md) – Reporting structure
38+
39+
---
40+
41+
## 🧪 Labs
42+
43+
- 🔍 [`lab1-osint-basics.md`](./labs/lab1-osint-basics.md) – OSINT basics
44+
- 🔍 [`lab2-evidence-preservation.md`](./labs/lab2-evidence-preservation.md) – Evidence preservation
45+
- 🔍 [`lab3-timeline-analysis.md`](./labs/lab3-timeline-analysis.md) – Timeline analysis
46+
- 🔍 [`lab4-log-analysis.md`](./labs/lab4-log-analysis.md) – Log analysis
47+
- 🔍 [`lab5-network-forensics.md`](./labs/lab5-network-forensics.md) – Network forensics
48+
- 🔍 [`lab6-malware-analysis.md`](./labs/lab6-malware-analysis.md) – Malware analysis basics
49+
- 🔍 [`lab7-incident-response-scenario.md`](./labs/lab7-incident-response-scenario.md) – Incident response scenario
50+
51+
---
52+
53+
## 📖 Docs
54+
55+
- 📘 [`index.md`](./docs/index.md) – Main documentation index
56+
- 📘 [`glossary.md`](./docs/glossary.md) – DFIR glossary
57+
- 📘 [`references.md`](./docs/references.md) – References & resources
58+
- 📘 [`roadmap.md`](./docs/roadmap.md) – Learning roadmap
59+
- 📘 [`syllabus.md`](./docs/syllabus.md) – Course syllabus
60+
61+
---
62+
63+
## 📦 Extras
64+
65+
- 🎯 [`cheat-sheets.md`](./extras/cheat-sheets.md) – DFIR cheat sheets
66+
- 🎯 [`dataset-samples.md`](./extras/dataset-samples.md) – Sample datasets
67+
- 🎯 [`methodology-overview.md`](./extras/methodology-overview.md) – Methodology overview
68+
- 🎯 [`tooling-guide.md`](./extras/tooling-guide.md) – Tooling guide
69+
70+
---
71+
72+
## 📸 Screenshots
73+
74+
| Step | Screenshot |
75+
|-----------------------|------------|
76+
| 🏫 Course Introduction | ![](./screenshots/intro-course.png) |
77+
| 🛣️ Learning Path | ![](./screenshots/path-course.png) |
78+
79+
---
80+
81+
## 📜 Certificate
82+
83+
🎓 [`Nguyen Vu Thanh Danh - 2025-12-05.pdf`](./cert/Nguyen%20Vu%20Thanh%20Danh%20-%202025-12-05.pdf)
84+
85+
---
86+
87+
## 📝 Personal Review
88+
89+
This course provided me with a strong **foundation in Digital Forensics and Incident Response**.
90+
The **hands-on labs with SleuthKit tools** gave practical experience in disk analysis, evidence preservation, and timeline reconstruction.
91+
I particularly appreciated the **real-world incident response scenarios**, which helped me understand the structured approach to forensic investigations.
92+
93+
Overall, this program is excellent for anyone looking to **build solid DFIR skills using open-source tools**.
94+
95+
---
96+
97+
## ✍️ Author
98+
99+
**Nguyễn Vũ Thành Danh** – Red Team Learner & Security Researcher
100+
101+
- GitHub: [@ngvuthdanhh](https://github.com/ngvuthdanhh)
102+
- Email: ngvu.thdanh@gmail.com
103+
104+
---
105+
106+
## 📄 License
107+
108+
This project is licensed under the terms of the **MIT License**.
109+
See [`LICENSE`](./LICENSE) for full details.
110+
111+
© 2025 Nguyễn Vũ Thành Danh. All rights reserved.

0 commit comments

Comments
 (0)