Course curriculum

    1. Intro_Introduction to the course

    2. M1L1V1 What Is Digital Forensics v2

    3. M1L1V2 - The Forensic Process

    4. M1L1V3 - Types of Digital Evidence

    1. M1L2V1 Where Digital Forensics Fits in the Cybersecurity Life Cycle

    2. M1L2V2 Real-World Use Cases- Insider Threats

    3. M1L2V3 Potential Sources of Evidence

    1. M1L3V1 Chain of Custody and Admissibility in Court

    2. M1L3V2 Privacy_ Consent_ and Ethical Boundaries

    3. M1L3V3_Regional and International Laws Impacting Digital Evidence

    1. M2L1V1-Types of Acquisition and Image Formats

    2. M2L1V2- Precautions During Evidence Handling-

    3. M2L1V3- Write Blockers and Imaging Best Practices-

    1. M2L2V1- Disk Imaging with FTK Imager and Analysis in Autopsy-

    2. M2L2V2 - Bit-by-Bit Imaging Using DD (Linux CLI)

    3. M2L2V3 - Hashing for Integrity (MD5 - SHA1 - SHA256)

    1. M2L3V1 - Maintaining Forensic Soundness

    2. M2L3V2 - Chain of Custody Concept and Importance

    3. M2L3V3 - Labelling and Evidence Bagging Procedures

About this course

  • Free
  • 41 lessons
  • 4 hours of video content

Discover your potential, starting today