Coursera
Coursera Logo

EC-Council - Digital Forensics Essentials (DFE) 

  • Offered byCoursera

Digital Forensics Essentials (DFE)
 at 
Coursera 
Overview

Duration

25 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Digital Forensics Essentials (DFE)
 at 
Coursera 
Highlights

  • Earn a Certificate upon completion
Details Icon

Digital Forensics Essentials (DFE)
 at 
Coursera 
Course details

More about this course
  • This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process
  • Plan to learn about Dark Web, Windows, Linux, Malware Forensics, and so much more
  • The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in digital forensics
  • This improves their prospects for employment advancement, higher salaries, and greater job satisfaction

Digital Forensics Essentials (DFE)
 at 
Coursera 
Curriculum

Module 01: Computer Forensics Fundamentals

Course Introduction

Video 1.1: Introduction

Video 1.2: Understanding the Fundamentals of Computer Forensics

Video 1.3: Understanding Different Types of Cybercrimes

Video 1.4: Overview of Different Types of Digital Evidence and Rules of Evidence

Video 1.5: Understanding Forensic Readiness Planning and Business Continuity

Video 1.6: Understanding the Roles and Responsibilities of a Forensic Investigator

Video 1.7: Understanding the Legal Compliance in Computer Forensics

Video 1.2: Quiz

Video 1.3: Quiz

Video 1.4: Quiz

Video 1.5: Quiz

Video 1.6: Quiz

Video 1.7: Quiz

Module 01 - Quiz

Video 2.1: Introduction

Video 2.2: Understanding the Forensic Investigation Process and its Importance

Video 2.3: Understanding the Pre-investigation Phase

Video 2.4: Understanding the Investigation Phase

Video 2.5: Understanding the Post-investigation Phase

Video 2.2: Quiz

Video 2.3: Quiz

Video 2.4: Quiz

Video 2.5: Understanding the Post-investigation Phase - Quiz

Module 02 - Quiz

Module 03: Understanding Hard Disks and File Systems

Video 3.1: Introduction

Video 3.2: Understanding Different Types of Storage Drives and their Characteristics

Video 3.3: Understanding the Logical Structure of a Disk

Video 3.4: Understanding the Booting Process of Windows, Linux, and Mac Operating Systems

Video 3.5: Overview of various File Systems of Windows, Linux, and Mac Operating Systems

Video 3.6: Analyzing File Systems using Autopsy and The Sleuth Kit

Video 3.2: Quiz

Video 3.3: Quiz

Video 3.4: Quiz

Video 3.5: Quiz

Video 3.6: Quiz

Module 03 - Quiz

Video 4.1: Introduction

Video 4.2: Understanding the Data Acquisition Fundamentals

Video 4.3: Understanding the Different Types of Data Acquisition

Video 4.4: Understanding the Data Acquisition Format

Video 4.5: Understanding the Data Acquisition Methodology

Video 4.2: Quiz

Video 4.3: Understanding the Different Types of Data Acquisition - Quiz

Video 4.4: Quiz

Video 4.5: Quiz

Module 04 - Quiz

Module 05: Defeating Anti-forensics Techniques

Video 5.1: Introduction

Video 5.2: Understanding the Anti-forensics Techniques

Video 5.3: Understanding the Data Deletion and Recycle Bin Forensics

Video 5.4: Overview of File Carving Techniques and Ways to Recover Evidence from Deleted Partitions

Video 5.5: Understanding the Password Cracking/Bypassing Techniques

Video 5.6: Understanding How to Detect Steganography, Hidden Data in File System Structures, and Trail Obfuscation

Video 5.7: Understanding the Techniques of Artifact Wiping, Overwritten Data/ Metadata Detection, and Encryption

Video 5.8: Overview of Anti-forensics Countermeasures and Anti-forensics Tools

Video 5.2: Quiz

Video 5.3: Quiz

Video 5.4: Quiz

Video 5.5: Quiz

Video 5.6: Quiz

Video 5.7: Quiz

Video 5.8: Quiz

Module 05 - Quiz

Video 6.1: Introduction

Video 6.2: Understanding the Collection Of Volatile and Non-volatile Information

Video 6.3: Understanding the Windows Memory and Registry Analysis

Video 6.4: Understanding How to Examine Cache, Cookie, and History Recorded in Web Browsers

Video 6.5: Understanding How to Examine Windows Files and Metadata

Video 6.2: Quiz

Video 6.3: Quiz

Video 6.4: Quiz

Video 6.5: Quiz

Module 06 - Quiz

Module 07: Linux and Mac Forensics

Video 7.1: Introduction

Video 7.2: Understanding the Volatile and Non-Volatile Data in Linux

Video 7.3: Understanding the Filesystem Images Analysis using The Sleuth Kit

Video 7.4: Understanding the Memory Forensics using Volatility and PhotoRec

Video 7.5: Understanding the Mac Forensics

Video 7.2: Quiz

Video 7.3: Quiz

Video 7.4: Quiz

Video 7.5: Quiz

Module 07 - Quiz

Video 8.1: Introduction

Video 8.2: Understanding the Network Forensics Fundamentals

Video 8.3: Understanding the Logging Fundamentals

Video 8.4: Understanding the Event Correlation Concepts

Video 8.5: Overview of Identifying Indicators of Compromise (IoCs) from Network Logs

Video 8.6: Understanding How to Investigate Network Traffic

Video 8.2: Quiz

Video 8.3: Quiz

Video 8.4: Quiz

Video 8.5: Quiz

Video 8.6: Quiz

Module 08 - Quiz

Module 09: Investigating Web Attacks

Video 9.1: Introduction

Video 9.2: Understanding the Web Application Forensics

Video 9.3: Understanding the Internet Information Services (IIS) Logs

Video 9.4: Understanding the Apache Web Server Logs

Video 9.5: Overview of Web Attacks on Windows-based Servers

Video 9.6: Understanding How to Detect and Investigate various Attacks on Web Applications

Video 9.2: Quiz

Video 9.3: Quiz

Video 9.4: Quiz

Video 9.5: Quiz

Video 9.6: Quiz

Module 09 - Quiz

Video 10.1: Introduction

Video 10.2: Understanding the Dark Web

Video 10.3: Understanding How to Identify the Traces of Tor Browser During Investigation

Video 10.4: Understanding the Tor Browser Forensics

Video 10.5: Overview of Collecting and Analyzing Memory Dumps

Video 10.2: Quiz

Video 10.3: Quiz

Video 10.4: Quiz

Video 10.5: Quiz

Module 10 - Quiz

Module 11: Investigating Email Crimes

Video 11.1: Introduction

Video 11.2: Understanding the Email System

Video 11.3: Understanding the Components Involved in Email Communication

Video 11.4: Understanding the Parts of an Email Message

Video 11.5: Overview of Email Crime Investigation and its Steps

Video 11.2: Quiz

Video 11.3: Understanding the Components Involved in Email Communication - Quiz

Video 11.4: Quiz

Video 11.5: Quiz

Module 11 - Quiz

Video 12.1: Module Introduction

Video 12.2: Understanding Malware and the Common Techniques Attackers Use to Spread Malware

Video 12.3: Understanding Malware Forensics Fundamentals and Types of Malware Analysis

Video 12.4: Overview of Static Analysis of Malware

Video 12.5: Overview of Analysis of Suspicious Word Documents

Video 12.6: Understanding Dynamic Malware Analysis Fundamentals and Approaches

Video 12.7: Understanding the Analysis of Malware Behavior on System Properties in Real-time

Video 12.8: Understanding the Analysis of Malware Behavior on Network in Real-time

Video 12.2: Quiz

Video 12.3: Quiz

Video 12.4: Quiz

Video 12.5: Quiz

Video 12.6: Quiz

Video 12.7: Quiz

Video 12.8: Quiz

Module 12 - Quiz

Digital Forensics Essentials (DFE)
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Digital Forensics Essentials (DFE)
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...