- Level Foundation
- المدة 25 ساعات hours
- الطبع بواسطة EC-Council
-
Offered by
عن
Digital Forensics Essentials helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer. This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, Linux, Malware Forensics, and so much more! The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in digital forensics. DFE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.الوحدات
Course Introduction
1
Videos
- Course Introduction
Module Introduction
1
Videos
- Introduction
Understanding the Fundamentals of Computer Forensics
1
Assignment
- Understanding the Fundamentals of Computer Forensics
1
Videos
- Understanding the Fundamentals of Computer Forensics
Understanding Different Types of Cybercrimes
1
Assignment
- Understanding Different Types of Cybercrimes
1
Videos
- Understanding Different Types of Cybercrimes
Overview of Different Types of Digital Evidence and Rules of Evidence
1
Assignment
- Overview of Different Types of Digital Evidence and Rules of Evidence
1
Videos
- Overview of Different Types of Digital Evidence and Rules of Evidence
Understanding Forensic Readiness Planning and Business Continuity
1
Assignment
- Understanding Forensic Readiness Planning and Business Continuity
1
Videos
- Understanding Forensic Readiness Planning and Business Continuity
Understanding the Roles and Responsibilities of a Forensic Investigator
1
Assignment
- Understanding the Roles and Responsibilities of a Forensic Investigator
1
Videos
- Understanding the Roles and Responsibilities of a Forensic Investigator
Understanding the Legal Compliance in Computer Forensics
2
Assignment
- Understanding the Legal Compliance in Computer Forensics
- Computer Forensics Fundamentals
1
Videos
- Understanding the Legal Compliance in Computer Forensics
Module Introduction
1
Videos
- Introduction
Understanding the Forensic Investigation Process and its Importance
1
Assignment
- Understanding the Forensic Investigation Process and its Importance
1
Videos
- Understanding the Forensic Investigation Process and its Importance
Understanding the Pre-investigation Phase
1
Assignment
- Understanding the Pre-investigation Phase
1
Videos
- Understanding the Pre-investigation Phase
Understanding the Investigation Phase
1
Assignment
- Understanding the Investigation Phase
1
Videos
- Understanding the Investigation Phase
Understanding the Post-investigation Phase
2
Assignment
- Understanding the Post-investigation Phase
- Computer Forensics Investigation Process
1
Videos
- Understanding the Post-investigation Phase
Module Introduction
1
Videos
- Introduction
Understanding Different Types of Storage Drives and their Characteristics
1
Assignment
- Understanding Different Types of Storage Drives and their Characteristics
1
Videos
- Understanding Different Types of Storage Drives and their Characteristics
Understanding the Logical Structure of a Disk
1
Assignment
- Understanding the Logical Structure of a Disk
1
Videos
- Understanding the Logical Structure of a Disk
Understanding the Booting Process of Windows, Linux, and Mac Operating Systems
1
Assignment
- Understanding the Booting Process of Windows, Linux, and Mac Operating Systems
1
Videos
- Understanding the Booting Process of Windows, Linux, and Mac Operating Systems
Overview of Various File Systems of Windows, Linux, and Mac Operating Systems
1
Assignment
- Overview of various File Systems of Windows, Linux, and Mac Operating Systems
1
Videos
- Overview of various File Systems of Windows, Linux, and Mac Operating Systems
Analyzing File Systems using Autopsy and The Sleuth Kit
2
Assignment
- Analyzing File Systems using Autopsy and The Sleuth Kit
- Understanding Hard Disks and File Systems
1
Videos
- Analyzing File Systems using Autopsy and The Sleuth Kit
Module Introduction
1
Videos
- Introduction
Understanding the Data Acquisition Fundamentals
1
Assignment
- Understanding the Data Acquisition Fundamentals
1
Videos
- Understanding the Data Acquisition Fundamentals
Understanding the Different Types of Data Acquisition
1
Assignment
- Understanding the Different Types of Data Acquisition
1
Videos
- Understanding the Different Types of Data Acquisition
Understanding the Data Acquisition Format
1
Assignment
- Understanding the Data Acquisition Format
1
Videos
- Understanding the Data Acquisition Format
Understanding the Data Acquisition Methodology
2
Assignment
- Understanding the Data Acquisition Methodology
- Data Acquisition and Duplication
1
Videos
- Understanding the Data Acquisition Methodology
Module Introduction
1
Videos
- Introduction
Understanding the Anti-forensics Techniques
1
Assignment
- Understanding the Anti-forensics Techniques
1
Videos
- Understanding the Anti-forensics Techniques
Understanding the Data Deletion and Recycle Bin Forensics
1
Assignment
- Understanding the Data Deletion and Recycle Bin Forensics
1
Videos
- Understanding the Data Deletion and Recycle Bin Forensics
Overview of File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
1
Assignment
- Overview of File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
1
Videos
- Overview of File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
Understanding the Password Cracking/Bypassing Techniques
1
Assignment
- Understanding the Password Cracking/Bypassing Techniques
1
Videos
- Understanding the Password Cracking/Bypassing Techniques
Understanding How to Detect Steganography, Hidden Data in File System Structures, and Trail Obfuscation
1
Assignment
- Understanding How to Detect Steganography, Hidden Data in File System Structures, and Trail Obfuscation
1
Videos
- Understanding How to Detect Steganography, Hidden Data in File System Structures, and Trail Obfuscation
Understanding the Techniques of Artifact Wiping, Overwritten Data/ Metadata Detection, and Encryption
1
Assignment
- Understanding the Techniques of Artifact Wiping, Overwritten Data/ Metadata Detection, and Encryption
1
Videos
- Understanding the Techniques of Artifact Wiping, Overwritten Data/ Metadata Detection, and Encryption
Overview of Anti-forensics Countermeasures and Anti-forensics Tools
2
Assignment
- Overview of Anti-forensics Countermeasures and Anti-forensics Tools
- Defeating Anti-forensics Techniques
1
Videos
- Overview of Anti-forensics Countermeasures and Anti-forensics Tools
Module Introduction
1
Videos
- Introduction
Understanding the Collection Of Volatile and Non-volatile Information
1
Assignment
- Understanding the Collection Of Volatile and Non-volatile Information
1
Videos
- Understanding the Collection Of Volatile and Non-volatile Information
Understanding the Windows Memory and Registry Analysis
1
Assignment
- Understanding the Windows Memory and Registry Analysis
1
Videos
- Understanding the Windows Memory and Registry Analysis
Understanding How to Examine Cache, Cookie, and History Recorded in Web Browsers
1
Assignment
- Understanding How to Examine Cache, Cookie, and History Recorded in Web Browsers
1
Videos
- Understanding How to Examine Cache, Cookie, and History Recorded in Web Browsers
Understanding How to Examine Windows Files and Metadata
2
Assignment
- Understanding How to Examine Windows Files and Metadata
- Windows Forensics
1
Videos
- Understanding How to Examine Windows Files and Metadata
Module Introduction
1
Videos
- Introduction
Understanding the Volatile and Non-Volatile Data in Linux
1
Assignment
- Understanding the Volatile and Non-Volatile Data in Linux
1
Videos
- Understanding the Volatile and Non-Volatile Data in Linux
Understanding the Filesystem Images Analysis using The Sleuth Kit
1
Assignment
- Understanding the Filesystem Images Analysis using The Sleuth Kit
1
Videos
- Understanding the Filesystem Images Analysis using The Sleuth Kit
Understanding the Memory Forensics using Volatility and PhotoRec
1
Assignment
- Understanding the Memory Forensics using Volatility and PhotoRec
1
Videos
- Understanding the Memory Forensics using Volatility and PhotoRec
Understanding the Mac Forensics
2
Assignment
- Understanding the Mac Forensics
- Linux and Mac Forensics
1
Videos
- Understanding the Mac Forensics
Module Introduction
1
Videos
- Introduction
Understanding the Network Forensics Fundamentals
1
Assignment
- Understanding the Network Forensics Fundamentals
1
Videos
- Understanding the Network Forensics Fundamentals
Understanding the Logging Fundamentals
1
Assignment
- Understanding the Logging Fundamentals
1
Videos
- Understanding the Logging Fundamentals
Understanding the Event Correlation Concepts
1
Assignment
- Understanding the Event Correlation Concepts
1
Videos
- Understanding the Event Correlation Concepts
Overview of Identifying Indicators of Compromise (IoCs) from Network Logs
1
Assignment
- Overview of Identifying Indicators of Compromise (IoCs) from Network Logs
1
Videos
- Overview of Identifying Indicators of Compromise (IoCs) from Network Logs
Understanding How to Investigate Network Traffic
2
Assignment
- Understanding How to Investigate Network Traffic
- Network Forensics
1
Videos
- Understanding How to Investigate Network Traffic
Module Introduction
1
Videos
- Introduction
Understanding the Web Application Forensics
1
Assignment
- Understanding the Web Application Forensics
1
Videos
- Understanding the Web Application Forensics
Understanding the Internet Information Services (IIS) Logs
1
Assignment
- Understanding the Internet Information Services (IIS) Logs
1
Videos
- Understanding the Internet Information Services (IIS) Logs
Understanding the Apache Web Server Logs
1
Assignment
- Understanding the Apache Web Server Logs
1
Videos
- Understanding the Apache Web Server Logs
Overview of Web Attacks on Windows-based Servers
1
Assignment
- Overview of Web Attacks on Windows-based Servers
1
Videos
- Overview of Web Attacks on Windows-based Servers
Understanding How to Detect and Investigate various Attacks on Web Applications
2
Assignment
- Understanding How to Detect and Investigate various Attacks on Web Applications
- Investigating Web Attacks
1
Videos
- Understanding How to Detect and Investigate various Attacks on Web Applications
Module Introduction
1
Videos
- Introduction
Understanding the Dark Web
1
Assignment
- Understanding the Dark Web
1
Videos
- Understanding the Dark Web
Understanding How to Identify the Traces of Tor Browser During Investigation
1
Assignment
- Understanding How to Identify the Traces of Tor Browser During Investigation
1
Videos
- Understanding How to Identify the Traces of Tor Browser During Investigation
Understanding the Tor Browser Forensics
1
Assignment
- Understanding the Tor Browser Forensics
1
Videos
- Understanding the Tor Browser Forensics
Overview of Collecting and Analyzing Memory Dumps
2
Assignment
- Overview of Collecting and Analyzing Memory Dumps
- Dark Web Forensics
1
Videos
- Overview of Collecting and Analyzing Memory Dumps
Module Introduction
1
Videos
- Introduction
Understanding the Email System
1
Assignment
- Understanding the Email System
1
Videos
- Understanding the Email System
Understanding the Components Involved in Email Communication
1
Assignment
- Understanding the Components Involved in Email Communication
1
Videos
- Understanding the Components Involved in Email Communication
Understanding the Parts of an Email Message
1
Assignment
- Understanding the Parts of an Email Message
1
Videos
- Understanding the Parts of an Email Message
Overview of Email Crime Investigation and its Steps
2
Assignment
- Overview of Email Crime Investigation and its Steps
- Investigating Email Crimes
1
Videos
- Overview of Email Crime Investigation and its Steps
Module Introduction
1
Videos
- Module Introduction
Understanding Malware and the Common Techniques Attackers Use to Spread Malware
1
Assignment
- Understanding Malware and the Common Techniques Attackers Use to Spread Malware
1
Videos
- Understanding Malware and the Common Techniques Attackers Use to Spread Malware
Understanding Malware Forensics Fundamentals and Types of Malware Analysis
1
Assignment
- Understanding Malware Forensics Fundamentals and Types of Malware Analysis
1
Videos
- Understanding Malware Forensics Fundamentals and Types of Malware Analysis
Overview of Static Analysis of Malware
1
Assignment
- Overview of Static Analysis of Malware
1
Videos
- Overview of Static Analysis of Malware
Overview of Analysis of Suspicious Word Documents
1
Assignment
- Overview of Analysis of Suspicious Word Documents
1
Videos
- Overview of Analysis of Suspicious Word Documents
Understanding Dynamic Malware Analysis Fundamentals and Approaches
1
Assignment
- Understanding Dynamic Malware Analysis Fundamentals and Approaches
1
Videos
- Understanding Dynamic Malware Analysis Fundamentals and Approaches
Understanding the Analysis of Malware Behavior on System Properties in Real-time
1
Assignment
- Understanding the Analysis of Malware Behavior on System Properties in Real-time
1
Videos
- Understanding the Analysis of Malware Behavior on System Properties in Real-time
Understanding the Analysis of Malware Behavior on Network in Real-time
2
Assignment
- Understanding the Analysis of Malware Behavior on Network in Real-time
- Malware Forensics
1
Videos
- Understanding the Analysis of Malware Behavior on Network in Real-time
Auto Summary
Unlock the essentials of digital forensics with the Digital Forensics Essentials (DFE) course, crafted for IT and Computer Science enthusiasts. This foundational course, offered by Coursera, is designed to bolster your expertise in digital forensics and information security, enhancing your professional value. Dive into the critical aspects of Computer Forensics Fundamentals and the Investigation Process, and explore comprehensive topics such as the Dark Web, Windows, Linux, and Malware Forensics. Engage with interactive labs that provide practical, hands-on experience crucial for a successful career in digital forensics. With the DFE certification, you gain formal recognition of your skills, making your resume stand out to potential employers and paving the way for career advancement, higher salaries, and job satisfaction. The course spans 1500 hours and is accessible through flexible subscription options - Starter and Professional - catering to various learning needs. Ideal for anyone looking to establish or advance their career in digital forensics, this course is your gateway to mastering the essentials and making a significant impact in the field.

EC-Council