Digital Forensics Essentials (DFE)
The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex technologies to be successful in their mission. Due to the complexity of the attack, investigating a crime in the cyber world has become increasingly difficult to do.
Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conducting audits to prevent the future attacks. It is used in different types of investigations like crime and civil investigation, corporate litigation, cybercrime etc. It plays a vital role in the investigation and prosecution of cybercriminals. It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment so that the discovered evidence can be used during a legal and/or administrative proceeding in a court of law. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.
Digital Forensics Essentials (DFE) is a security program covering the fundamental concepts of computer forensics. It equips students with the skills required to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in a court of law.
Upcoming start dates
- Self-paced Online
Who should attend?
This program is ideal for IT professionals who are seeking to foray into the exciting world of cybersecurity. Cybersecurity enthusiasts and students will readily find the program interesting, challenging, and useful.
Computer Forensics Fundamentals
This module discusses the role of computer forensics in today’s world.
Computer Forensics Investigation Process
This module describes the different stages involved in the complete computer forensic investigation process and highlights the role of expert witnesses in solving a cybercrime case. It also outlines the importance of formal investigation reports presented in a court of law during a trial.
Understanding Hard Disks and File Systems
This module provides insight into hard disks and file systems’ structure and behavior.
Data Acquisition and Duplication
This module discusses the fundamental concepts of data acquisition and the various steps involved in the data acquisition methodology.
Defeating Anti-forensics Techniques
This module outlines the fundamentals of anti-forensics techniques and elaborately discusses how forensic investigators can defeat them using various tools.
This module discusses how to collect and examine forensic evidence related to incidents of cybercrime on Windows machines.
Linux and Mac Forensics
This module discusses how to collect and examine evidence related to incidents of cybercrime on Linux and macOS–based machines.
This module discusses the methods of investigating network traffic to locate suspicious packets and identify indicators of compromise (IoCs) from the analysis of various log files.
Investigating Web Attacks
This module discusses the procedure of web application forensics, various types of attacks on web servers and applications, and where to look for evidence during an investigation. Furthermore, it explains how to detect and investigate various types of web-based attacks.
Dark Web Forensics
This module outlines the fundamentals of dark web forensics, describes the working of the Tor browser, and discusses steps to perform a forensic investigation of the Tor browser.
Investigating Email Crimes
This module familiarizes you with the subject of email crimes and how they occur. It primarily focuses on the steps an investigator needs to follow in an email crime investigation.
This module elaborately discusses the different types of malware, malware forensics fundamentals, and different types of malware analysis.
Course delivery details
This course is offered through EC-Council, a partner institute of EdX.
16-24 hours per week
- Verified Track -$99
- Audit Track - Free
Certification / Credits
What you'll learn
Students going through DFE training will learn
- Key issues plaguing the computer forensics
- Different types of digital evidence
- Computer forensic investigation process and its phases
- Different types of disk drives and file systems
- Data acquisition methods and data acquisition methodology
- Anti-forensics techniques and countermeasures
- Volatile and non-volatile information gathering from Windows, Linux, and Mac Systems
- Network forensics fundamentals, event correlation, and network traffic investigation
- Web server logs and web applications forensics
- Dark web forensics
- Email crime investigation
- Malware forensics fundamentals and different types of malware analysis
Contact this provider
edX For Business helps leading companies upskill their labor forces by making the world’s greatest educational resources available to learners across a wide variety of in-demand fields. edX For Business delivers high-quality corporate eLearning to train and engage your employees...