Professional Course

Digital Forensics Essentials (DFE)

edX, Online
1 week
99 USD
Next course start
Start anytime See details
Self-paced Online
1 week
99 USD
Next course start
Start anytime See details
Self-paced Online
Visit this course's homepage on the provider's site to learn more or book!

Course description

Digital Forensics Essentials (DFE)

The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex technologies to be successful in their mission. Due to the complexity of the attack, investigating a crime in the cyber world has become increasingly difficult to do.

Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conducting audits to prevent the future attacks. It is used in different types of investigations like crime and civil investigation, corporate litigation, cybercrime etc. It plays a vital role in the investigation and prosecution of cybercriminals. It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment so that the discovered evidence can be used during a legal and/or administrative proceeding in a court of law. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.

Digital Forensics Essentials (DFE) is a security program covering the fundamental concepts of computer forensics. It equips students with the skills required to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in a court of law.

Upcoming start dates

1 start date available

Start anytime

  • Self-paced Online
  • Online
  • English

Who should attend?


This program is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.

Training content

Computer Forensics Fundamentals

This module discusses the role of computer forensics in today’s world.

Computer Forensics Investigation Process

This module describes the different stages involved in the complete computer forensic investigation process and highlights the role of expert witnesses in solving a cybercrime case. It also outlines the importance of formal investigation reports presented in a court of law during a trial.

Understanding Hard Disks and File Systems

This module provides insight into hard disks and file systems’ structure and behavior.

Data Acquisition and Duplication

This module discusses the fundamental concepts of data acquisition and the various steps involved in the data acquisition methodology.

Defeating Anti-forensics Techniques

This module outlines the fundamentals of anti-forensics techniques and elaborately discusses how forensic investigators can defeat them using various tools.

Windows Forensics

This module discusses how to collect and examine forensic evidence related to incidents of cybercrime on Windows machines.

Linux and Mac Forensics

This module discusses how to collect and examine evidence related to incidents of cybercrime on Linux and macOS–based machines.

Network Forensics

This module discusses the methods of investigating network traffic to locate suspicious packets and identify indicators of compromise (IoCs) from the analysis of various log files.

Investigating Web Attacks

This module discusses the procedure of web application forensics, various types of attacks on web servers and applications, and where to look for evidence during an investigation. Furthermore, it explains how to detect and investigate various types of web-based attacks.

Dark Web Forensics

This module outlines the fundamentals of dark web forensics, describes the working of the Tor browser, and discusses steps to perform a forensic investigation of the Tor browser.

Investigating Email Crimes

This module familiarizes you with the subject of email crimes and how they occur. It primarily focuses on the steps an investigator needs to follow in an email crime investigation.

Malware Forensics

This module elaborately discusses the different types of malware, malware forensics fundamentals, and different types of malware analysis.

Course delivery details

This course is offered through EC-Council, a partner institute of EdX.

16-24 hours per week


  • Verified Track -$99
  • Audit Track - Free

Certification / Credits

What you'll learn

Students going through DFE training will learn

  • Key issues plaguing the computer forensics
  • Different types of digital evidence
  • Computer forensic investigation process and its phases
  • Different types of disk drives and file systems
  • Data acquisition methods and data acquisition methodology
  • Anti-forensics techniques and countermeasures
  • Volatile and non-volatile information gathering from Windows, Linux, and Mac Systems
  • Network forensics fundamentals, event correlation, and network traffic investigation
  • Web server logs and web applications forensics
  • Dark web forensics
  • Email crime investigation
  • Malware forensics fundamentals and different types of malware analysis

Contact this provider

Contact course provider

Fill out your details to find out more about Digital Forensics Essentials (DFE).

  Contact the provider

  Get more information

  Register your interest

Country *

reCAPTCHA logo This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
141 Portland Street
02139 Cambridge Massachusetts


edX For Business helps leading companies upskill their labor forces by making the world’s greatest educational resources available to learners across a wide variety of in-demand fields. edX For Business delivers high-quality corporate eLearning to train and engage your employees...

Read more and show all training delivered by this supplier