Course curriculum

    1. Segment 00 - Introduction to the course

    2. Segment 01 - What Is Digital Forensics v2

    3. Segment 02 - The Forensic Process

    4. Segment 03 - Types of Digital Evidence

    1. Segment 04 - Where Digital Forensics Fits in the Cybersecurity Life Cycle

    2. Segment 05 - Real-World Use Cases- Insider Threats

    3. Segment 06 - Potential Sources of Evidence

    4. Segment 07 - Reading - A Proactive Approach to Network Forensics Intrusion Using Dynamic Features Selection and Convolution Neural Network

    1. Segment 07 - Chain of Custody and Admissibility in Court

    2. Segment 08 - Privacy_ Consent_ and Ethical Boundaries

    3. Segment 09 - Regional and International Laws Impacting Digital Evidence

    4. Segment 12 - Quiz - Legal, Ethical, and Professional Considerations

    5. Segment 13 - Reading - What Is Digital Chain of Custody

    6. Segment 14: Hands-On-Learning - Matching the Digital Forensics Process with the Right Activity

    1. Segment 15 - Types of Acquisition and Image Formats

    2. Segment 16 - Precautions During Evidence Handling-

    3. Segment 17 - Write Blockers and Imaging Best Practices-

    1. Segment 18 - Disk Imaging with FTK Imager and Analysis in Autopsy-

    2. Segment 19 - Bit-by-Bit Imaging Using DD (Linux CLI)

    3. Segment 20 - Hashing for Integrity (MD5 - SHA1 - SHA256)

    1. Segment 21 - Maintaining Forensic Soundness

    2. Segment 22 - Chain of Custody Concept and Importance

    3. Segment 23 - Labelling and Evidence Bagging Procedures

    4. Segment 24 - Quiz - Preserving Evidence and Chain of Custody

    5. Segment 25 - Reading - Protecting Digital Evidence Integrity and Preserving Chain of Custody

    6. Segment 26 - Hands-On-Learning - Browser History and Registry Artifact Analysis

About this course

  • Free
  • 54 lessons
  • 4 hours of video content

Discover your potential, starting today