11 CHFI Module 11 Using Access Data FTK.zip
12 CHFI Module 12 Using EnCase.zip
13 CHFI Module 13 Steganography.zip
14 CHFI Module 14 Password Crackers.zip
15 CHFI Module 15 Log Correlation.zip
16 CHFI Module 16 Network Forensics.zip
17 CHFI Module 17 Wireless Attacks.zip
18 CHFI Module 18 Web Attacks.zip
19 CHFI Module 19 Email Crimes.zip
20 CHFI Module 20 Mobile Investigation.zip