Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

edX

Digital Forensics Essentials (DFE)

EC-Council via edX

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!

The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex technologies to be successful in their mission. Due to the complexity of the attack, investigating a crime in the cyber world has become increasingly difficult to do.

Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conducting audits to prevent the future attacks. It is used in different types of investigations like crime and civil investigation, corporate litigation, cybercrime etc. It plays a vital role in the investigation and prosecution of cybercriminals. It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment so that the discovered evidence can be used during a legal and/or administrative proceeding in a court of law. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.

Digital Forensics Essentials (DFE) is a security program covering the fundamental concepts of computer forensics. It equips students with the skills required to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in a court of law.

This program will give a holistic overview of the key components of computer forensics. It provides a solid fundamental knowledge required for a career in computer forensics.

Why is DFE Important?

§ It facilitates your entry into the world of computer forensics

§ It provides a professional understanding of the concepts of computer forensics

§ It enhances your skills as a Computer Forensics Specialist and increases your employability

Syllabus

Module 01: Computer Forensics Fundamentals

This module discusses the role of computer forensics in today’s world.

Module 02: Computer Forensics Investigation Process

This module describes the different stages involved in the complete computer forensic investigation process and highlights the role of expert witnesses in solving a cybercrime case. It also outlines the importance of formal investigation reports presented in a court of law during a trial.

Module 03: Understanding Hard Disks and File Systems

This module provides insight into hard disks and file systems’ structure and behavior.

Module 04: Data Acquisition and Duplication

This module discusses the fundamental concepts of data acquisition and the various steps involved in the data acquisition methodology.

Module 05: Defeating Anti-forensics Techniques

This module outlines the fundamentals of anti-forensics techniques and elaborately discusses how forensic investigators can defeat them using various tools.

Module 06: Windows Forensics

This module discusses how to collect and examine forensic evidence related to incidents of cybercrime on Windows machines.

Module 07: Linux and Mac Forensics

This module discusses how to collect and examine evidence related to incidents of cybercrime on Linux and macOS–based machines.

Module 08: Network Forensics

This module discusses the methods of investigating network traffic to locate suspicious packets and identify indicators of compromise (IoCs) from the analysis of various log files.

Module 09: Investigating Web Attacks

This module discusses the procedure of web application forensics, various types of attacks on web servers and applications, and where to look for evidence during an investigation. Furthermore, it explains how to detect and investigate various types of web-based attacks.

Module 10: Dark Web Forensics

This module outlines the fundamentals of dark web forensics, describes the working of the Tor browser, and discusses steps to perform a forensic investigation of the Tor browser.

Module 11: Investigating Email Crimes

This module familiarizes you with the subject of email crimes and how they occur. It primarily focuses on the steps an investigator needs to follow in an email crime investigation.

Module 12: Malware Forensics

This module elaborately discusses the different types of malware, malware forensics fundamentals, and different types of malware analysis.

Taught by

Kevin King

Reviews

4.7 rating at edX based on 15 ratings

Start your review of Digital Forensics Essentials (DFE)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.