There is one session available:
Digital Forensics Essentials (DFE)
About this courseSkip About this course
The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex technologies to be successful in their mission. Due to the complexity of the attack, investigating a crime in the cyber world has become increasingly difficult to do.
Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conducting audits to prevent the future attacks. It is used in different types of investigations like crime and civil investigation, corporate litigation, cybercrime etc. It plays a vital role in the investigation and prosecution of cybercriminals. It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment so that the discovered evidence can be used during a legal and/or administrative proceeding in a court of law. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.
Digital Forensics Essentials (DFE) is a security program covering the fundamental concepts of computer forensics. It equips students with the skills required to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in a court of law.
This program will give a holistic overview of the key components of computer forensics. It provides a solid fundamental knowledge required for a career in computer forensics.
Why is DFE Important?
§ It facilitates your entry into the world of computer forensics
§ It provides a professional understanding of the concepts of computer forensics
§ It enhances your skills as a Computer Forensics Specialist and increases your employability
At a glance
- Language: English
- Video Transcript: English
- Associated programs:
- Professional Certificate in Cybersecurity Essentials
What you'll learnSkip What you'll learn
Students going through DFE training will learn:
§ Key issues plaguing the computer forensics
§ Different types of digital evidence
§ Computer forensic investigation process and its phases
§ Different types of disk drives and file systems
§ Data acquisition methods and data acquisition methodology
§ Anti-forensics techniques and countermeasures
§ Volatile and non-volatile information gathering from Windows, Linux, and Mac Systems
§ Network forensics fundamentals, event correlation, and network traffic investigation
§ Web server logs and web applications forensics
§ Dark web forensics
§ Email crime investigation
§ Malware forensics fundamentals and different types of malware analysis
Module 01: Computer Forensics Fundamentals
This module discusses the role of computer forensics in today’s world.
Module 02: Computer Forensics Investigation Process
This module describes the different stages involved in the complete computer forensic investigation process and highlights the role of expert witnesses in solving a cybercrime case. It also outlines the importance of formal investigation reports presented in a court of law during a trial.
Module 03: Understanding Hard Disks and File Systems
This module provides insight into hard disks and file systems’ structure and behavior.
Module 04: Data Acquisition and Duplication
This module discusses the fundamental concepts of data acquisition and the various steps involved in the data acquisition methodology.
Module 05: Defeating Anti-forensics Techniques
This module outlines the fundamentals of anti-forensics techniques and elaborately discusses how forensic investigators can defeat them using various tools.
Module 06: Windows Forensics
This module discusses how to collect and examine forensic evidence related to incidents of cybercrime on Windows machines.
Module 07: Linux and Mac Forensics
This module discusses how to collect and examine evidence related to incidents of cybercrime on Linux and macOS–based machines.
Module 08: Network Forensics
This module discusses the methods of investigating network traffic to locate suspicious packets and identify indicators of compromise (IoCs) from the analysis of various log files.
Module 09: Investigating Web Attacks
This module discusses the procedure of web application forensics, various types of attacks on web servers and applications, and where to look for evidence during an investigation. Furthermore, it explains how to detect and investigate various types of web-based attacks.
Module 10: Dark Web Forensics
This module outlines the fundamentals of dark web forensics, describes the working of the Tor browser, and discusses steps to perform a forensic investigation of the Tor browser.
Module 11: Investigating Email Crimes
This module familiarizes you with the subject of email crimes and how they occur. It primarily focuses on the steps an investigator needs to follow in an email crime investigation.
Module 12: Malware Forensics
This module elaborately discusses the different types of malware, malware forensics fundamentals, and different types of malware analysis.