08: Investigations, Evidence, and Chain of Custody
09: Principles of Data Acquisition and Analysis
10: Network Monitoring and Traffic Analysis
11: Network Forensic Data Collection Considerations
12: Investigating Windows System Environments
13: Investigating Web Applications and Email
14: Vulnerability Assessment and Management