EC-Council - Digital Forensics Essentials (DFE)
- Offered byCoursera
Digital Forensics Essentials (DFE) at Coursera Overview
Duration | 25 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Digital Forensics Essentials (DFE) at Coursera Highlights
- Earn a Certificate upon completion
Digital Forensics Essentials (DFE) at Coursera Course details
- This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process
- Plan to learn about Dark Web, Windows, Linux, Malware Forensics, and so much more
- The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in digital forensics
- This improves their prospects for employment advancement, higher salaries, and greater job satisfaction
Digital Forensics Essentials (DFE) at Coursera Curriculum
Module 01: Computer Forensics Fundamentals
Course Introduction
Video 1.1: Introduction
Video 1.2: Understanding the Fundamentals of Computer Forensics
Video 1.3: Understanding Different Types of Cybercrimes
Video 1.4: Overview of Different Types of Digital Evidence and Rules of Evidence
Video 1.5: Understanding Forensic Readiness Planning and Business Continuity
Video 1.6: Understanding the Roles and Responsibilities of a Forensic Investigator
Video 1.7: Understanding the Legal Compliance in Computer Forensics
Video 1.2: Quiz
Video 1.3: Quiz
Video 1.4: Quiz
Video 1.5: Quiz
Video 1.6: Quiz
Video 1.7: Quiz
Module 01 - Quiz
Video 2.1: Introduction
Video 2.2: Understanding the Forensic Investigation Process and its Importance
Video 2.3: Understanding the Pre-investigation Phase
Video 2.4: Understanding the Investigation Phase
Video 2.5: Understanding the Post-investigation Phase
Video 2.2: Quiz
Video 2.3: Quiz
Video 2.4: Quiz
Video 2.5: Understanding the Post-investigation Phase - Quiz
Module 02 - Quiz
Module 03: Understanding Hard Disks and File Systems
Video 3.1: Introduction
Video 3.2: Understanding Different Types of Storage Drives and their Characteristics
Video 3.3: Understanding the Logical Structure of a Disk
Video 3.4: Understanding the Booting Process of Windows, Linux, and Mac Operating Systems
Video 3.5: Overview of various File Systems of Windows, Linux, and Mac Operating Systems
Video 3.6: Analyzing File Systems using Autopsy and The Sleuth Kit
Video 3.2: Quiz
Video 3.3: Quiz
Video 3.4: Quiz
Video 3.5: Quiz
Video 3.6: Quiz
Module 03 - Quiz
Video 4.1: Introduction
Video 4.2: Understanding the Data Acquisition Fundamentals
Video 4.3: Understanding the Different Types of Data Acquisition
Video 4.4: Understanding the Data Acquisition Format
Video 4.5: Understanding the Data Acquisition Methodology
Video 4.2: Quiz
Video 4.3: Understanding the Different Types of Data Acquisition - Quiz
Video 4.4: Quiz
Video 4.5: Quiz
Module 04 - Quiz
Module 05: Defeating Anti-forensics Techniques
Video 5.1: Introduction
Video 5.2: Understanding the Anti-forensics Techniques
Video 5.3: Understanding the Data Deletion and Recycle Bin Forensics
Video 5.4: Overview of File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
Video 5.5: Understanding the Password Cracking/Bypassing Techniques
Video 5.6: Understanding How to Detect Steganography, Hidden Data in File System Structures, and Trail Obfuscation
Video 5.7: Understanding the Techniques of Artifact Wiping, Overwritten Data/ Metadata Detection, and Encryption
Video 5.8: Overview of Anti-forensics Countermeasures and Anti-forensics Tools
Video 5.2: Quiz
Video 5.3: Quiz
Video 5.4: Quiz
Video 5.5: Quiz
Video 5.6: Quiz
Video 5.7: Quiz
Video 5.8: Quiz
Module 05 - Quiz
Video 6.1: Introduction
Video 6.2: Understanding the Collection Of Volatile and Non-volatile Information
Video 6.3: Understanding the Windows Memory and Registry Analysis
Video 6.4: Understanding How to Examine Cache, Cookie, and History Recorded in Web Browsers
Video 6.5: Understanding How to Examine Windows Files and Metadata
Video 6.2: Quiz
Video 6.3: Quiz
Video 6.4: Quiz
Video 6.5: Quiz
Module 06 - Quiz
Module 07: Linux and Mac Forensics
Video 7.1: Introduction
Video 7.2: Understanding the Volatile and Non-Volatile Data in Linux
Video 7.3: Understanding the Filesystem Images Analysis using The Sleuth Kit
Video 7.4: Understanding the Memory Forensics using Volatility and PhotoRec
Video 7.5: Understanding the Mac Forensics
Video 7.2: Quiz
Video 7.3: Quiz
Video 7.4: Quiz
Video 7.5: Quiz
Module 07 - Quiz
Video 8.1: Introduction
Video 8.2: Understanding the Network Forensics Fundamentals
Video 8.3: Understanding the Logging Fundamentals
Video 8.4: Understanding the Event Correlation Concepts
Video 8.5: Overview of Identifying Indicators of Compromise (IoCs) from Network Logs
Video 8.6: Understanding How to Investigate Network Traffic
Video 8.2: Quiz
Video 8.3: Quiz
Video 8.4: Quiz
Video 8.5: Quiz
Video 8.6: Quiz
Module 08 - Quiz
Module 09: Investigating Web Attacks
Video 9.1: Introduction
Video 9.2: Understanding the Web Application Forensics
Video 9.3: Understanding the Internet Information Services (IIS) Logs
Video 9.4: Understanding the Apache Web Server Logs
Video 9.5: Overview of Web Attacks on Windows-based Servers
Video 9.6: Understanding How to Detect and Investigate various Attacks on Web Applications
Video 9.2: Quiz
Video 9.3: Quiz
Video 9.4: Quiz
Video 9.5: Quiz
Video 9.6: Quiz
Module 09 - Quiz
Video 10.1: Introduction
Video 10.2: Understanding the Dark Web
Video 10.3: Understanding How to Identify the Traces of Tor Browser During Investigation
Video 10.4: Understanding the Tor Browser Forensics
Video 10.5: Overview of Collecting and Analyzing Memory Dumps
Video 10.2: Quiz
Video 10.3: Quiz
Video 10.4: Quiz
Video 10.5: Quiz
Module 10 - Quiz
Module 11: Investigating Email Crimes
Video 11.1: Introduction
Video 11.2: Understanding the Email System
Video 11.3: Understanding the Components Involved in Email Communication
Video 11.4: Understanding the Parts of an Email Message
Video 11.5: Overview of Email Crime Investigation and its Steps
Video 11.2: Quiz
Video 11.3: Understanding the Components Involved in Email Communication - Quiz
Video 11.4: Quiz
Video 11.5: Quiz
Module 11 - Quiz
Video 12.1: Module Introduction
Video 12.2: Understanding Malware and the Common Techniques Attackers Use to Spread Malware
Video 12.3: Understanding Malware Forensics Fundamentals and Types of Malware Analysis
Video 12.4: Overview of Static Analysis of Malware
Video 12.5: Overview of Analysis of Suspicious Word Documents
Video 12.6: Understanding Dynamic Malware Analysis Fundamentals and Approaches
Video 12.7: Understanding the Analysis of Malware Behavior on System Properties in Real-time
Video 12.8: Understanding the Analysis of Malware Behavior on Network in Real-time
Video 12.2: Quiz
Video 12.3: Quiz
Video 12.4: Quiz
Video 12.5: Quiz
Video 12.6: Quiz
Video 12.7: Quiz
Video 12.8: Quiz
Module 12 - Quiz