Table of Contents
- Working with System/File Info
- A Deep Dive into Mobile Forensics
- Extracting Embedded Metadata
- Exploring Networking and Indicators of Compromise
- Reading Emails and Taking Names
- Forensic Evidence
- Log Based Artifacts
- Exploring Windows Forensic Artifact
- Exploring Windows Forensic Artifact.
- Creating Artifact Report

