Course curriculum

    1. Segment 00 - Introduction to the course

    2. Segment 01 - What Is Digital Forensics v2

    3. Segment 02 - The Forensic Process

    4. Segment 03 - Types of Digital Evidence

    1. Segment 04 - Where Digital Forensics Fits in the Cybersecurity Life Cycle

    2. Segment 05 - Real-World Use Cases- Insider Threats

    3. Segment 06 - Potential Sources of Evidence

    4. Segment 07 - Reading :- A Proactive Approach to Network Forensics Intrusion Using Dynamic Features Selection and Convolution Neural Network

    1. Segment 07 - Chain of Custody and Admissibility in Court

    2. Segment 08 - Privacy_ Consent_ and Ethical Boundaries

    3. Segment 09 - Regional and International Laws Impacting Digital Evidence

    4. Segment 12 - Quiz

    5. Reading:- What Is Digital Chain of Custody

    1. Segment 13 - Types of Acquisition and Image Formats

    2. Segment 14 - Precautions During Evidence Handling-

    3. Segment 15 - Write Blockers and Imaging Best Practices-

    1. Segment 16 - Disk Imaging with FTK Imager and Analysis in Autopsy-

    2. Segment 17 - Bit-by-Bit Imaging Using DD (Linux CLI)

    3. Segment 18 - Hashing for Integrity (MD5 - SHA1 - SHA256)

    1. Segment 19 - Maintaining Forensic Soundness

    2. Segment 20 - Chain of Custody Concept and Importance

    3. Segment 21 - Labelling and Evidence Bagging Procedures

    4. Segment 24 - Quiz

About this course

  • Free
  • 47 lessons
  • 4 hours of video content

Discover your potential, starting today