|
1 | | -# certificate-intro-to-dfir-divide-and-conquer-sleuthkitlabs |
| 1 | +# 🔍 Intro to DFIR: Divide & Conquer (SleuthKitLabs) |
| 2 | + |
| 3 | +-darkblue?style=flat-square&logo=sleuthkit) |
| 4 | + |
| 5 | + |
| 6 | + |
| 7 | + |
| 8 | + |
| 9 | +This repository contains **notes, labs, operations guides, and certificate of completion** for the *Intro to DFIR: Divide & Conquer* course by SleuthKitLabs. |
| 10 | +The course focuses on **digital forensics fundamentals, evidence handling, timeline analysis, and incident response** using SleuthKit and related tools. |
| 11 | + |
| 12 | +--- |
| 13 | + |
| 14 | +## 📚 Notes |
| 15 | + |
| 16 | +- 📄 [`01-introduction.md`](./notes/01-introduction.md) – Introduction to DFIR |
| 17 | +- 📄 [`02-target-research-osint.md`](./notes/02-target-research-osint.md) – OSINT for target research |
| 18 | +- 📄 [`03-pretexting-and-lure-design.md`](./notes/03-pretexting-and-lure-design.md) – Pretexting & lure design |
| 19 | +- 📄 [`04-delivery-infrastructure.md`](./notes/04-delivery-infrastructure.md) – Delivery infrastructure setup |
| 20 | +- 📄 [`05-delivery-techniques.md`](./notes/05-delivery-techniques.md) – Delivery techniques |
| 21 | +- 📄 [`06-opsec-foundations.md`](./notes/06-opsec-foundations.md) – OPSEC foundations |
| 22 | +- 📄 [`07-evasion-techniques.md`](./notes/07-evasion-techniques.md) – Evasion techniques |
| 23 | +- 📄 [`08-tracking-and-analytics.md`](./notes/08-tracking-and-analytics.md) – Tracking & analytics |
| 24 | +- 📄 [`09-red-team-phishing-lifecycle.md`](./notes/09-red-team-phishing-lifecycle.md) – Red team phishing lifecycle |
| 25 | +- 📄 [`10-reporting-and-lessons-learned.md`](./notes/10-reporting-and-lessons-learned.md) – Reporting & lessons learned |
| 26 | + |
| 27 | +--- |
| 28 | + |
| 29 | +## 🔧 Operations |
| 30 | + |
| 31 | +- ⚙️ [`01-evidence-handling.md`](./operations/01-evidence-handling.md) – Evidence handling procedures |
| 32 | +- ⚙️ [`02-filesystem-analysis.md`](./operations/02-filesystem-analysis.md) – Filesystem analysis |
| 33 | +- ⚙️ [`03-artifact-processing.md`](./operations/03-artifact-processing.md) – Artifact processing |
| 34 | +- ⚙️ [`04-timeline-construction.md`](./operations/04-timeline-construction.md) – Timeline construction |
| 35 | +- ⚙️ [`05-keyword-and-pattern-search.md`](./operations/05-keyword-and-pattern-search.md) – Keyword & pattern search |
| 36 | +- ⚙️ [`06-correlation-and-triangulation.md`](./operations/06-correlation-and-triangulation.md) – Correlation & triangulation |
| 37 | +- ⚙️ [`07-reporting-structure.md`](./operations/07-reporting-structure.md) – Reporting structure |
| 38 | + |
| 39 | +--- |
| 40 | + |
| 41 | +## 🧪 Labs |
| 42 | + |
| 43 | +- 🔍 [`lab1-osint-basics.md`](./labs/lab1-osint-basics.md) – OSINT basics |
| 44 | +- 🔍 [`lab2-evidence-preservation.md`](./labs/lab2-evidence-preservation.md) – Evidence preservation |
| 45 | +- 🔍 [`lab3-timeline-analysis.md`](./labs/lab3-timeline-analysis.md) – Timeline analysis |
| 46 | +- 🔍 [`lab4-log-analysis.md`](./labs/lab4-log-analysis.md) – Log analysis |
| 47 | +- 🔍 [`lab5-network-forensics.md`](./labs/lab5-network-forensics.md) – Network forensics |
| 48 | +- 🔍 [`lab6-malware-analysis.md`](./labs/lab6-malware-analysis.md) – Malware analysis basics |
| 49 | +- 🔍 [`lab7-incident-response-scenario.md`](./labs/lab7-incident-response-scenario.md) – Incident response scenario |
| 50 | + |
| 51 | +--- |
| 52 | + |
| 53 | +## 📖 Docs |
| 54 | + |
| 55 | +- 📘 [`index.md`](./docs/index.md) – Main documentation index |
| 56 | +- 📘 [`glossary.md`](./docs/glossary.md) – DFIR glossary |
| 57 | +- 📘 [`references.md`](./docs/references.md) – References & resources |
| 58 | +- 📘 [`roadmap.md`](./docs/roadmap.md) – Learning roadmap |
| 59 | +- 📘 [`syllabus.md`](./docs/syllabus.md) – Course syllabus |
| 60 | + |
| 61 | +--- |
| 62 | + |
| 63 | +## 📦 Extras |
| 64 | + |
| 65 | +- 🎯 [`cheat-sheets.md`](./extras/cheat-sheets.md) – DFIR cheat sheets |
| 66 | +- 🎯 [`dataset-samples.md`](./extras/dataset-samples.md) – Sample datasets |
| 67 | +- 🎯 [`methodology-overview.md`](./extras/methodology-overview.md) – Methodology overview |
| 68 | +- 🎯 [`tooling-guide.md`](./extras/tooling-guide.md) – Tooling guide |
| 69 | + |
| 70 | +--- |
| 71 | + |
| 72 | +## 📸 Screenshots |
| 73 | + |
| 74 | +| Step | Screenshot | |
| 75 | +|-----------------------|------------| |
| 76 | +| 🏫 Course Introduction |  | |
| 77 | +| 🛣️ Learning Path |  | |
| 78 | + |
| 79 | +--- |
| 80 | + |
| 81 | +## 📜 Certificate |
| 82 | + |
| 83 | +🎓 [`Nguyen Vu Thanh Danh - 2025-12-05.pdf`](./cert/Nguyen%20Vu%20Thanh%20Danh%20-%202025-12-05.pdf) |
| 84 | + |
| 85 | +--- |
| 86 | + |
| 87 | +## 📝 Personal Review |
| 88 | + |
| 89 | +This course provided me with a strong **foundation in Digital Forensics and Incident Response**. |
| 90 | +The **hands-on labs with SleuthKit tools** gave practical experience in disk analysis, evidence preservation, and timeline reconstruction. |
| 91 | +I particularly appreciated the **real-world incident response scenarios**, which helped me understand the structured approach to forensic investigations. |
| 92 | + |
| 93 | +Overall, this program is excellent for anyone looking to **build solid DFIR skills using open-source tools**. |
| 94 | + |
| 95 | +--- |
| 96 | + |
| 97 | +## ✍️ Author |
| 98 | + |
| 99 | +**Nguyễn Vũ Thành Danh** – Red Team Learner & Security Researcher |
| 100 | + |
| 101 | +- GitHub: [@ngvuthdanhh](https://github.com/ngvuthdanhh) |
| 102 | +- Email: ngvu.thdanh@gmail.com |
| 103 | + |
| 104 | +--- |
| 105 | + |
| 106 | +## 📄 License |
| 107 | + |
| 108 | +This project is licensed under the terms of the **MIT License**. |
| 109 | +See [`LICENSE`](./LICENSE) for full details. |
| 110 | + |
| 111 | +© 2025 Nguyễn Vũ Thành Danh. All rights reserved. |
0 commit comments