Course

Digital Forensics Concepts

Infosec

In the Digital Forensics Concepts course, students will explore the legal considerations relevant to computer forensics, gaining an understanding of applicable laws and ethical practices. They will delve into the scientific principles underpinning digital forensics, learning about Locard’s Exchange Principle, the Scientific Method, and the handling of big data. The course also covers the practical aspects of digital forensics, including the identification, collection, and preservation of digital evidence, as well as the use of keyword lists, grep, and file hashing. Students will gain proficiency in on-scene triaging, preservation of digital evidence, and creating forensic disk images. Additionally, they will develop skills in network basics and reporting, with a focus on report writing and peer review.

  • Explore legal considerations and ethical practices in computer forensics.
  • Understand the scientific principles and methodologies of digital forensics.
  • Learn practical techniques for identifying, collecting, and preserving digital evidence.
  • Gain proficiency in on-scene triaging, file hashing, and keyword searching.
  • Develop skills in creating forensic disk images, network basics, and report writing.

Certificate Available ✔

Get Started / More Info
Digital Forensics Concepts
Course Modules

The Digital Forensics Concepts course covers a wide range of topics, including legal considerations, scientific principles, digital evidence collection, preservation, and reporting.

Introduction to Digital Forensics

Welcome to the Digital Forensics Concepts course, where students are introduced to the fundamental concepts and methodologies of digital forensics. They will learn about the role of the examiner, forensic methodology, and the preparation of forensic workstations.

Legal Considerations and search authority

Module 2 focuses on legal considerations and search authority in digital forensics. Students will explore applicable laws, ethics, preservation, consent, and the process of obtaining search warrants and subpoenas.

The Investigation Process

This module delves into the investigation process, covering Locard’s Exchange Principle, the Scientific Method, and the handling of big data in digital forensics.

Recognizing and Collecting Digital Evidence

Here, students will learn about recognizing and collecting digital evidence, including preparation for the scene, documentation, recognition, collection, and proper storage and transportation of digital evidence.

Preservation of evidence/On scene triage

Module 5 focuses on the preservation of evidence and on-scene triage, covering topics such as live vs. dead box evidence collection, capturing volatile media, and forensic boot options.

Hash values and file hashing

Students will gain an understanding of hash values and file hashing, including the function and uses of hashing, creating hash sets, and hashing files.

Creating a disk image

This module covers the process of creating a disk image, including sterilizing target media, validating tools, using write blockers, and creating and validating a forensic image using tools like Linux DD Command.

Keyword and grep searches

Module 8 focuses on keyword and grep searches, teaching students how to formulate case-specific keyword lists, review grep, use grep search, and perform keyword searching with autopsy.

Network Basics

This module provides an overview of network basics, including the definition of a network, IP and MAC addresses, internet protocols, and the OSI model.

Reporting and Peer Review

Students will learn about report writing and peer review, understanding the importance of tool-generated reports, and the significance of peer review in digital forensics.

Digital Forensics Project

Finally, this module guides students through a digital forensics project, offering a walkthrough of questions, project hints, challenge questions, and project solutions.

More Security Courses

Security Analyst Fundamentals

IBM

This course equips you with the essential skills needed to become a successful cybersecurity analyst, covering digital forensics, incident response, penetration...

Palo Alto Networks Cybersecurity Foundation

Palo Alto Networks

This course equips students with essential cybersecurity knowledge, from recognizing threats to configuring security zones on next-generation firewalls.

Microsoft Cybersecurity Analyst

Microsoft

Prepare for a career in cybersecurity with Microsoft's Cybersecurity Analyst program. Gain hands-on experience and industry-recognized certification to protect organizations...

Securing the IoT Landscape: From Inception to Architecture

LearnQuest

Securing the IoT Landscape: From Inception to Architecture offers a comprehensive understanding of IoT security, covering device identity, preventive measures, incident...