Course description
Computer Forensics
Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.
We have included a set of optional and ungraded course activities to allow self-directed learners to gain hands-on experience. To be able to complete these optional and ungraded course activities, you will need to have a system with the following requirements:
- A 64-bit version of Windows, Mac OSX, or Linux system as your core operating system that can install and run VMware virtualization products
- 8 GB of RAM minimum
- USB port(s)
- 200+ Gigabyte Host System Hard Drive
- 50+ Gigabytes of Free Space
- Have the local administrator access
Upcoming start dates
Suitability - Who should attend?
Prerequisites:
Successful completion of Cybersecurity Fundamentals
Outcome / Qualification etc.
What you'll learn
- Court admissibility investigative procedures
- Attributes of various Windows and Unix/Linux file systems and file recovery processes
- To identify and apply appropriate forensics tools to acquire, preserve and analyze system image
- Review and critique a forensics report
Training Course Content
- Digital Forensics FundamentalsIntroduction to Incident response digital forensics four-step procedure Concepts: computer/network/Internet forensic and anti-forensics
- Unix/Linux fundamentalsUnix/Linux incident response tools Unix/Linux file systems (Ext2/Ext3)
- Unix/Linux Forensic InvestigationUnix/Linux forensics investigation steps and technologies Unix/Linux forensics case studies
- Windows Incident ResponseMemory forensics Windows incident response tools
- WindowsfundamentalsWindows file systems Windows forensics tools
- Windows Forensic InvestigationWindows acquisition Windows forensics analysis registry and other artifacts
- Advanced artifactsLoadable kernel module rootkits Steganography hiding, detection and analysis
- Review and Everything Together
Course delivery details
This course is offered through Rochester Institute of Technology, a partner institute of EdX.
10-12 hours per week
Expenses
- Verified Track -$399
- Audit Track - Free