The Digital Forensics Essentials (DFE) : Hands-On Edition course provides learners with the skills needed to conduct forensic investigations and analyze digital evidence.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

Digital Forensics Essentials: Hands-On Edition
本课程是 Information Security Analyst 专业证书 的一部分

位教师:EC-Council
包含在 中
您将学到什么
Network forensics fundamentals, event correlation, and network traffic investigation
Data acquisition concepts, types, format, and methodology
Computer forensics investigation process and its phases
Fundamental concepts of computer forensics
您将获得的技能
要了解的详细信息

添加到您的领英档案
71 项作业
了解顶级公司的员工如何掌握热门技能

积累 Computer Security and Networks 领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 通过 EC-Council 获得可共享的职业证书

该课程共有12个模块
Computer forensics plays a vital role in the investigation and prosecution of cybercriminals. The process includes the acquisition, inspection, and reporting of information stored across computers and networks in relation to a civil or criminal incident. Forensic investigators are trained professionals who extract, analyze/investigate, and report crimes that either target technology or use it as a tool to commit a crime. This module discusses the role of computer forensics in today’s world.
涵盖的内容
8个视频7个作业
8个视频• 总计75分钟
- Course Introduction• 5分钟
- Introduction• 2分钟
- Understanding the Fundamentals of Computer Forensics• 7分钟
- Understanding Different Types of Cybercrimes• 7分钟
- Overview of Different Types of Digital Evidence and Rules of Evidence• 30分钟
- Understanding Forensic Readiness Planning and Business Continuity• 12分钟
- Understanding the Roles and Responsibilities of a Forensic Investigator• 8分钟
- Understanding the Legal Compliance in Computer Forensics• 4分钟
7个作业• 总计80分钟
- Understanding the Fundamentals of Computer Forensics• 10分钟
- Understanding Different Types of Cybercrimes• 10分钟
- Overview of Different Types of Digital Evidence and Rules of Evidence• 10分钟
- Understanding Forensic Readiness Planning and Business Continuity• 10分钟
- Understanding the Roles and Responsibilities of a Forensic Investigator• 10分钟
- Understanding the Legal Compliance in Computer Forensics• 10分钟
- Computer Forensics Fundamentals• 20分钟
One of the goals of performing a forensic investigation process is to have a better understanding of an incident by identifying and analyzing the evidence thereof. This module describes the different stages involved in the complete computer forensic investigation process and highlights the role of expert witnesses in solving a cybercrime case. It also outlines the importance of formal investigation reports presented in a court of law during a trial.
涵盖的内容
5个视频5个作业1个应用程序项目
5个视频• 总计51分钟
- Introduction• 1分钟
- Understanding the Forensic Investigation Process and its Importance• 7分钟
- Understanding the Pre-investigation Phase• 13分钟
- Understanding the Investigation Phase• 17分钟
- Understanding the Post-investigation Phase• 13分钟
5个作业• 总计60分钟
- Understanding the Forensic Investigation Process and its Importance• 10分钟
- Understanding the Pre-investigation Phase• 10分钟
- Understanding the Investigation Phase• 10分钟
- Understanding the Post-investigation Phase• 10分钟
- Computer Forensics Investigation Process• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Storage devices such as Hard Disk Drives (HDDs) and Solid-State Drives (SSDs) are an important source of information during forensic investigation. The investigator should locate and protect the data collected from storage devices as evidence. Therefore, it is necessary for the investigator to have knowledge on the structure and behavior of storage devices. The file system is also important as the storage and distribution of the data in a device is dependent on the file system used. This module provides insight into hard disks and file systems.
涵盖的内容
6个视频6个作业1个应用程序项目
6个视频• 总计134分钟
- Introduction• 2分钟
- Understanding Different Types of Storage Drives and their Characteristics• 28分钟
- Understanding the Logical Structure of a Disk• 31分钟
- Understanding the Booting Process of Windows, Linux, and Mac Operating Systems• 39分钟
- Overview of Various File Systems of Windows, Linux, and Mac Operating Systems• 30分钟
- Analyzing File Systems using Autopsy and The Sleuth Kit• 6分钟
6个作业• 总计70分钟
- Understanding Different Types of Storage Drives and their Characteristics • 10分钟
- Understanding the Logical Structure of a Disk• 10分钟
- Understanding the Booting Process of Windows, Linux, and Mac Operating Systems• 10分钟
- Overview of Various File Systems of Windows, Linux, and Mac Operating Systems• 10分钟
- Analyzing File Systems using Autopsy and The Sleuth Kit• 10分钟
- Understanding Hard Disks and File Systems• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Data acquisition is the first proactive step in the forensic investigation process. Forensic data acquisition does not merely entail the copying of files from one device to another. Through forensic data acquisition, investigators aim to extract every bit of information present in the victim system’s memory and storage, in order to create a forensic copy of this information. Further, this forensic copy must be created in a manner such that integrity of the data is verifiably preserved and can be used as evidence in the court. This module discusses the fundamental concepts of data acquisition and the various steps involved in the data acquisition methodology.
涵盖的内容
5个视频5个作业1个应用程序项目
5个视频• 总计39分钟
- Introduction• 1分钟
- Understanding the Data Acquisition Fundamentals• 9分钟
- Understanding the Different Types of Data Acquisition• 5分钟
- Understanding the Data Acquisition Format• 5分钟
- Understanding the Data Acquisition Methodology• 19分钟
5个作业• 总计60分钟
- Understanding the Data Acquisition Fundamentals• 10分钟
- Understanding the Different Types of Data Acquisition• 10分钟
- Understanding the Data Acquisition Format• 10分钟
- Understanding the Data Acquisition Methodology• 10分钟
- Data Acquisition and Duplication• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
After compromising a system, attackers often try to destroy or hide all traces of their activities; this makes forensic investigation extremely challenging for investigators. The use of various techniques by cyber-criminals to destroy or hide traces of illegal activities and hinder forensic investigation processes are referred to as anti-forensics. Forensic investigators need to overcome/defeat anti-forensics so that an investigation yields concrete and accurate evidence that helps identify and prosecute the perpetrators. This module outlines the fundamentals of anti-forensics techniques and elaborately discusses how forensic investigators can defeat them using various tools.
涵盖的内容
8个视频8个作业1个应用程序项目
8个视频• 总计51分钟
- Introduction• 2分钟
- Understanding the Anti-forensics Techniques• 2分钟
- Understanding the Data Deletion and Recycle Bin Forensics• 11分钟
- Overview of File Carving Techniques and Ways to Recover Evidence from Deleted Partitions• 11分钟
- Understanding the Password Cracking/Bypassing Techniques• 4分钟
- Understanding How to Detect Steganography, Hidden Data in File System Structures, and Trail Obfuscation• 9分钟
- Understanding the Techniques of Artifact Wiping, Overwritten Data/ Metadata Detection, and Encryption• 7分钟
- Overview of Anti-forensics Countermeasures and Anti-forensics Tools• 5分钟
8个作业• 总计90分钟
- Understanding the Anti-forensics Techniques• 10分钟
- Understanding the Data Deletion and Recycle Bin Forensics• 10分钟
- Overview of File Carving Techniques and Ways to Recover Evidence from Deleted Partitions• 10分钟
- Understanding the Password Cracking/Bypassing Techniques• 10分钟
- Understanding How to Detect Steganography, Hidden Data in File System Structures, and Trail Obfuscation• 10分钟
- Understanding the Techniques of Artifact Wiping, Overwritten Data/ Metadata Detection, and Encryption• 10分钟
- Overview of Anti-forensics Countermeasures and Anti-forensics Tools• 10分钟
- Defeating Anti-forensics Techniques• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Windows forensics refers to investigation of cyber-crimes involving Windows machines. It involves gathering of evidence from a Windows machine so that the perpetrator(s) of a cybercrime can be identified and prosecuted. Windows is one of the most widely used OSes; therefore, the possibility of a Windows machine being involved in an incident is high. So, investigators must have a thorough understanding of the various components of a Windows OS such as the file system, registries, system files, and event logs where they can find data of evidentiary value. This module discusses how to collect and examine forensic evidence related to incidents of cybercrime on Windows machines.
涵盖的内容
5个视频5个作业1个应用程序项目
5个视频• 总计64分钟
- Introduction• 1分钟
- Understanding the Collection Of Volatile and Non-volatile Information• 23分钟
- Understanding the Windows Memory and Registry Analysis• 17分钟
- Understanding How to Examine Cache, Cookie, and History Recorded in Web Browsers• 6分钟
- Understanding How to Examine Windows Files and Metadata• 17分钟
5个作业• 总计60分钟
- Understanding the Collection Of Volatile and Non-volatile Information• 10分钟
- Understanding the Windows Memory and Registry Analysis• 10分钟
- Understanding How to Examine Cache, Cookie, and History Recorded in Web Browsers• 10分钟
- Understanding How to Examine Windows Files and Metadata• 10分钟
- Windows Forensics• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Windows may be the most commonly used platform for forensic analysis owing to its popularity in enterprise systems. Several digital forensics tools exist for systems operating on Windows. However, when it comes to conducting forensics investigation on Linux and Mac systems, investigators are faced with a different kind of challenge. While the forensics techniques are the same, the tools used might differ. This module discusses how to collect and examine evidence related to incidents of cybercrime on Linux and MacOS–based machines.
涵盖的内容
5个视频5个作业1个应用程序项目
5个视频• 总计59分钟
- Introduction• 1分钟
- Understanding the Volatile and Non-Volatile Data in Linux• 31分钟
- Understanding the Filesystem Images Analysis using The Sleuth Kit• 3分钟
- Understanding the Memory Forensics using Volatility and PhotoRec• 6分钟
- Understanding the Mac Forensics• 18分钟
5个作业• 总计60分钟
- Understanding the Volatile and Non-Volatile Data in Linux• 10分钟
- Understanding the Filesystem Images Analysis using The Sleuth Kit• 10分钟
- Understanding the Memory Forensics using Volatility and PhotoRec• 10分钟
- Understanding the Mac Forensics• 10分钟
- Linux and Mac Forensics• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Network forensic investigation refers to the analysis of network security events (which include network attacks and other undesirable events that undermine the security of the network) for two broad purposes — to determine the causes of the network security events so that appropriate safeguards and countermeasures can be adopted, and to gather evidence against the perpetrators of the attack for presentation in the court of law. This module discusses the methods of investigating network traffic to locate suspicious packets and identify indicators of compromise (IoCs) from the analysis of various log files.
涵盖的内容
6个视频6个作业1个应用程序项目
6个视频• 总计56分钟
- Introduction• 1分钟
- Understanding the Network Forensics Fundamentals• 1分钟
- Understanding the Logging Fundamentals• 12分钟
- Understanding the Event Correlation Concepts• 9分钟
- Overview of Identifying Indicators of Compromise (IoCs) from Network Logs• 17分钟
- Understanding How to Investigate Network Traffic• 16分钟
6个作业• 总计70分钟
- Understanding the Network Forensics Fundamentals• 10分钟
- Understanding the Logging Fundamentals• 10分钟
- Understanding the Event Correlation Concepts• 10分钟
- Overview of Identifying Indicators of Compromise (IoCs) from Network Logs• 10分钟
- Understanding How to Investigate Network Traffic• 10分钟
- Network Forensics• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Web applications allow users to access their resources through client-side programs such as web browsers. Some web applications may contain vulnerabilities that allow cyber criminals to launch application-specific attacks such as SQL Injection, cross site scripting, local file inclusion (LFI), command injection, etc., which cause either partial or complete damage of the underlying servers. Moreover, such attacks against web applications can lead to massive financial and reputational damage for organizations. In most cases, organizations are unable to trace the root cause of an attack, which leaves security loopholes for the attackers to exploit. This is where web application forensics assumes significance. This module discusses the procedure of web application forensics, various types of attacks on web servers and applications, and where to look for evidence during an investigation. Furthermore, it explains how to detect and investigate various types of web-based attacks.
涵盖的内容
6个视频6个作业1个应用程序项目
6个视频• 总计53分钟
- Introduction• 1分钟
- Understanding the Web Application Forensics• 16分钟
- Understanding the Internet Information Services (IIS) Logs• 9分钟
- Understanding the Apache Web Server Logs• 8分钟
- Overview of Web Attacks on Windows-based Servers• 4分钟
- Understanding How to Detect and Investigate various Attacks on Web Applications• 15分钟
6个作业• 总计70分钟
- Understanding the Web Application Forensics• 10分钟
- Understanding the Internet Information Services (IIS) Logs• 10分钟
- Understanding the Apache Web Server Logs• 10分钟
- Overview of Web Attacks on Windows-based Servers• 10分钟
- Understanding How to Detect and Investigate various Attacks on Web Applications• 10分钟
- Investigating Web Attacks• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
The web has three layers: the surface web, the deep web, and the dark web. While the surface web and deep web are used for legitimate purposes, the dark web is mostly used by cyber criminals to perpetrate nefarious/antisocial activities. Access to the dark web requires the use of the Tor browser, which provides users with a high level of anonymity through a complex mechanism, thereby allowing criminals to hide their identities. This module outlines the fundamentals of dark web forensics, describes the workings of the Tor browser, and discusses steps to perform forensic investigation of the Tor browser.
涵盖的内容
5个视频5个作业1个应用程序项目
5个视频• 总计19分钟
- Introduction• 1分钟
- Understanding the Dark Web• 8分钟
- Understanding How to Identify the Traces of Tor Browser During Investigation• 6分钟
- Understanding the Tor Browser Forensics• 1分钟
- Overview of Collecting and Analyzing Memory Dumps• 2分钟
5个作业• 总计60分钟
- Understanding the Dark Web• 10分钟
- Understanding How to Identify the Traces of Tor Browser During Investigation• 10分钟
- Understanding the Tor Browser Forensics• 10分钟
- Overview of Collecting and Analyzing Memory Dumps• 10分钟
- Dark Web Forensics• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Over the past few decades, email services have been extensively used for communication all over the world for exchanging texts and multimedia messages. However, this has also made email a powerful tool for cybercriminals to spread malicious messages and perform illegal activities. The current module intends to familiarize you with the subject of email crimes and how they occur. It primarily focuses on the steps an investigator needs to follow in an email crime investigation.
涵盖的内容
5个视频5个作业1个应用程序项目
5个视频• 总计29分钟
- Introduction• 1分钟
- Understanding the Email System• 1分钟
- Understanding the Components Involved in Email Communication• 5分钟
- Understanding the Parts of an Email Message• 1分钟
- Overview of Email Crime Investigation and its Steps• 20分钟
5个作业• 总计60分钟
- Understanding the Email System• 10分钟
- Understanding the Components Involved in Email Communication• 10分钟
- Understanding the Parts of an Email Message• 10分钟
- Overview of Email Crime Investigation and its Steps• 10分钟
- Investigating Email Crimes• 20分钟
1个应用程序项目• 总计60分钟
- Practice Lab• 60分钟
Currently, malicious software, commonly called malware, is the most efficient tool for compromising the security of a computer or any other electronic device connected to the internet. This has become a menace owing to the rapid progress in technologies such as easy encryption and data-hiding techniques. Malware is the major source of various cyber-attacks and internet security threats; therefore, computer forensic analysts need to have the expertise to deal with them. This module elaborately discusses the different types of malware, malware forensics fundamentals, and different types of malware analysis that investigators can perform to examine the malicious code and determine how the malware interacts with the system resources and the network during the runtime.
涵盖的内容
8个视频8个作业2个应用程序项目
8个视频• 总计66分钟
- Module Introduction• 2分钟
- Understanding Malware and the Common Techniques Attackers Use to Spread Malware• 11分钟
- Understanding Malware Forensics Fundamentals and Types of Malware Analysis• 14分钟
- Overview of Static Analysis of Malware• 9分钟
- Overview of Analysis of Suspicious Word Documents• 5分钟
- Understanding Dynamic Malware Analysis Fundamentals and Approaches• 6分钟
- Understanding the Analysis of Malware Behavior on System Properties in Real-time• 14分钟
- Understanding the Analysis of Malware Behavior on Network in Real-time• 5分钟
8个作业• 总计90分钟
- Understanding Malware and the Common Techniques Attackers Use to Spread Malware• 10分钟
- Understanding Malware Forensics Fundamentals and Types of Malware Analysis• 10分钟
- Overview of Static Analysis of Malware• 10分钟
- Overview of Analysis of Suspicious Word Documents• 10分钟
- Understanding Dynamic Malware Analysis Fundamentals and Approaches• 10分钟
- Understanding the Analysis of Malware Behavior on System Properties in Real-time• 10分钟
- Understanding the Analysis of Malware Behavior on Network in Real-time• 10分钟
- Malware Forensics• 20分钟
2个应用程序项目• 总计120分钟
- Practice Lab• 60分钟
- Capstone• 60分钟
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方

提供方

Best known for the Certified Ethical Hacker program, EC-Council builds individual and team/organization cyber capabilities through the Certified Ethical Hacker Program and other programs including Certified Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst, Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst, Certified Incident Handler, as well as the Certified Chief Information Security Officer.
从 Computer Security and Networks 浏览更多内容
EEC-Council
课程
SStarweaver
课程
MMacquarie University
课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
更多问题
提供助学金,


