Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.
This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.
Week 1: Digital Forensics Fundamentals Introduction to Incident response digital forensics four-step procedure Concepts: computer/network/Internet forensic and anti-forensics Week 2: Unix/Linux fundamentals Unix/Linux incident response tools Unix/Linux file systems (Ext2/Ext3) Week 3: Unix/Linux Forensic Investigation Unix/Linux forensics investigation steps and technologies Unix/Linux forensics case studies Week 4: Windows Incident Response Memory forensics Windows incident response tools Week 5: Windowsfundamentals Windows file systems Windows forensics tools Week 6:Windows Forensic Investigation Windows acquisition Windows forensics analysis – registry and other artifacts Week 7: Advanced artifacts Loadable kernel module rootkits Steganography hiding, detection and analysis Week 8: Review and Everything Together
Kristina Šekrst completed this course and found the course difficulty to be medium.
I thoroughly recommend this course for everyone interested not only in cybersecurity, but data analysis as well. The course covers Windows, Linux, and a bit mobile platforms, and gives you software recommendations (both open-source and commercial ones),...
I thoroughly recommend this course for everyone interested not only in cybersecurity, but data analysis as well. The course covers Windows, Linux, and a bit mobile platforms, and gives you software recommendations (both open-source and commercial ones), along with useful video demos of using such tools. You will learn about file-system structures, hardware, software, Internet traces, and learn how many fingerprints one can leave behind his usual usage. The instructor is knowledgeable, and discussion forums are active. I never thought this topic could be so interesting, but you'll learn not only how to use the tools, but also when to use them and why to use them. A perfect start for an introduction to computer forensics, and the course gives you lots of recommendations for future research.