1. Andriller Tool Use Case

21. OSForensics Tool Use Case

2. Blurity Tool Use Case

22. Procmon Tool Use Case

3. Browser history examiner Tool Use Case

23. Process Explorer Tool Use Case

4. Bulk Extractor Tool Use Case

24. Recuva Tool Use Case

5. Disk wipe Tool Use Case

25. Redline Tool Use Case

6. Exiftool Tool Use Case

26. Rufus Tool Use Case

7. File Matadata Tool Use Case

27. Splunk Tool Use Case

8. Hash Calc Tool Use Case

28. Sys Analyzer Tool Use Case

9. Hash My file Tool Use Case

29. TCP view Tool Use Case

10. Helix Tool Use Case

30. Tor Tool Use Case

11. Hex editor Neo Tool Use Case

31. Unknown_File_Hunter Tool Use Case

12. HxD Tool Use Case

32. USB Device View Tool Use Case

13. Jpeg Snoop Tool Use Case

33. Veracrypt Tool Use Case

14. Kernel for Exchange Server Tool Use Case

34. Volatility Tool Use Case

15. Log parsar Tool Use Case

35. WFA Tool Use Case

16. Magnet RAM Capture Tool Use Case

36. Win Audit Tool Use Case

17. Maltego Carbon Set Up Tool Use Case

37. Win IP Config Tool Use Case

18. Malwarebytes Tool Use Case

38. WIRESHARK Tool Use Case

19. Manage Engine Desktop Tool Use Case

39. Autopsy Tool Use Case

20. Network Miner Tool Use Case

40. MD5 Summer Tool Use Case


Access the Virtual Cyber Lab