We may earn an affiliate commission when you visit our partners.
Course image
John Boyle

This course is designed for people with a working knowledge of computer forensics but looking to go deeper into specific skill and techniques of the the field. This is the second course following my pervious course Computer Forensics Fundamentals. While that course is recommended it is not required to take this course as they are independent in regard to topics taught.

Read more

This course is designed for people with a working knowledge of computer forensics but looking to go deeper into specific skill and techniques of the the field. This is the second course following my pervious course Computer Forensics Fundamentals. While that course is recommended it is not required to take this course as they are independent in regard to topics taught.

  • Intermediate Computer Forensics will provide:
  • Understanding of Public vs Private investigations
  • Understanding of different types of computer forensics software
  • Disk Image Analysis through searching and keyword lists
  • File carving and the Thumb DB file
  • Website and Browser history forensics
  • Recycle bin and deleted files forensics
  • Creating forensics reports of an investigation

The course will consist of presentations to explain the concepts of computer forensics as well as demonstrations of proper software and collections of digital evidence.

This course is designed for anyone with an interest computer forensics to get a deeper taste of the real world of digital forensics examination.

As an intermediate course it will consist of presentations, hands on lessons and quizs.

Enroll now

What's inside

Learning objectives

  • Know different types of investigations and investigative software
  • Know how to search a computer image for relevant files both active and deleted
  • Know how to search a web browser history, recycle bin and thumbs db file for evidence
  • Know the basics of creating a computer forensics report

Syllabus

Introduction

Introduction lecture for Intermediate Computer Forensics to discuss the topics that will be covered as well as the way the course will be taught.

Read more
Public vs. Private Investigations

A discussions of the differences and nuances of a public vs private investigations.

Types of Investigation Software
Types of software for investigation
Investigations quiz
Overview of Software and Dowload of Software/Images
Why this software for this course
Software used in this Course
Disk Images
Image Analysis
Using the Software to Analyse an Image
Searching the Image for Evidence
Search Quiz
File Carving and Thumbs.db
File Carving
Thumbs.db
Carving a file from the Image
Analysis of the Thumbs.db
Website History and Analysis
Web Browsers 101 - Types and what information they provide
Finding the Browser Data and Interpreting
Recycle Bin and Deleted Files
Recycle Bin and Deleted files - Finding files after they ahve been deleted
Finding evidence in the Recycle Bin
Finding Deleted Files on the Image
Reporting
Producing Reports from the Investigation
Conclution and Wrap Up
Conclustion and Wrap Up
Bonus Lecture: More computer forensics

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers various types of investigations and investigative software, providing a comprehensive understanding
Develops practical skills in searching computer images for evidence, including both active and deleted files
Provides hands-on lessons and quizzes to reinforce concepts and test understanding
Teaches techniques for analyzing website and browser history, recycle bin, and Thumbs DB file for evidence
Builds a foundation in creating computer forensics reports, essential for documenting investigations

Save this course

Save Intermediate Computer Forensics to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Intermediate Computer Forensics with these activities:
Organize Your Course Materials
Enhance your ability to locate and retrieve information efficiently by organizing your course materials, including notes, assignments, quizzes, and exams.
Show steps
  • Create a dedicated folder or notebook for the course.
  • File and label materials according to topic or assignment.
  • Use color-coding or highlighting to categorize different types of materials.
Review Python Programming Basics
Refresh your Python programming skills to ensure a smooth transition into the more advanced topics covered in this course.
Browse courses on Python Programming
Show steps
  • Review online tutorials or documentation on Python basics.
  • Practice writing simple Python scripts to reinforce your understanding.
  • Complete coding exercises or solve puzzles to test your proficiency.
Practice Searching Disk Images
Enhance your ability to locate relevant files, both active and deleted, from computer images by engaging in targeted practice drills.
Show steps
  • Obtain sample disk images or use the ones provided in the course materials.
  • Use forensic software to search the images for specific keywords or file types.
  • Analyze the search results and identify potential evidence.
Two other activities
Expand to see all activities and additional details
Show all five activities
Explore Advanced Browser Forensics Techniques
Delve deeper into the intricacies of browser forensics by following guided tutorials that demonstrate advanced techniques for extracting and analyzing web browsing data.
Show steps
  • Identify reputable online resources or video tutorials on advanced browser forensics.
  • Follow the instructions provided in the tutorials to explore techniques such as cache analysis and cookie examination.
  • Practice applying these techniques on sample data or real-world cases.
Participate in a Computer Forensics CTF
Challenge your skills and deepen your understanding by participating in a capture-the-flag (CTF) competition specifically designed for intermediate computer forensics.
Browse courses on Computer Forensics
Show steps
  • Identify and register for an appropriate CTF competition that aligns with the topics covered in this course.
  • Team up with peers or participate individually to solve forensic challenges and capture flags.
  • Analyze evidence, extract data, and apply your knowledge to solve real-world forensic scenarios.

Career center

Learners who complete Intermediate Computer Forensics will develop knowledge and skills that may be useful to these careers:
Computer Forensics Analyst
A Computer Forensics Analyst may use the skills and techniques learned in an Intermediate Computer Forensics course to examine digital devices for evidence in criminal investigations. This course teaches students techniques such as disk image analysis, file carving, and website and browser history forensics. These are all essential skills for a Computer Forensics Analyst because they allow them to examine digital devices for evidence.
Digital Forensic Examiner
A Digital Forensic Examiner may use the skills and techniques learned in an Intermediate Computer Forensics course to examine digital devices for evidence in civil or criminal cases. This course provides students with a foundation in the principles and practices of computer forensics, including how to collect, preserve, and analyze digital evidence. This course also provides students with hands-on experience using computer forensics software and techniques, which is essential for a Digital Forensic Examiner.
Security Consultant
A Security Consultant may use the skills and techniques learned in an Intermediate Computer Forensics course to help organizations protect their information systems from unauthorized access and attack. This course provides students with a foundation in computer security and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them identify and respond to security incidents.
Information Security Analyst
An Information Security Analyst may use the skills and techniques learned in an Intermediate Computer Forensics course to protect the confidentiality, integrity, and availability of information systems. This course provides students with a foundation in information security and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them protect information systems from attack.
Cybersecurity Analyst
A Cybersecurity Analyst may use the skills and techniques learned in an Intermediate Computer Forensics course to investigate and respond to cybersecurity incidents. This course provides students with a foundation in the principles of cybersecurity and computer forensics, which is essential for a Cybersecurity Analyst. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them identify and respond to cybersecurity incidents.
Computer Security Analyst
A Computer Security Analyst may use the skills and techniques learned in an Intermediate Computer Forensics course to protect computer systems and networks from unauthorized access and attack. This course provides students with a foundation in computer security and computer forensics. This course also provides students with hands-on experience using computer forensic software and techniques, which can help them prevent and respond to security incidents.
Network Security Engineer
A Network Security Engineer may use the skills and techniques learned in an Intermediate Computer Forensics course to design, implement, and maintain secure networks. This course provides students with a foundation in network security and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them identify and respond to security incidents.
Security Architect
A Security Architect may use the skills and techniques learned in an Intermediate Computer Forensics course to design and implement security solutions for organizations. This course provides students with a foundation in computer security and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them design and implement security solutions.
Fraud Investigator
A Fraud Investigator may use the skills and techniques learned in an Intermediate Computer Forensics course to investigate fraud. This course provides students with a foundation in fraud investigation and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them investigate fraud.
Forensic Accountant
A Forensic Accountant may use the skills and techniques learned in an Intermediate Computer Forensics course to investigate financial crimes. This course provides students with a foundation in forensic accounting and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them investigate financial crimes.
Private Investigator
A Private Investigator may use the skills and techniques learned in an Intermediate Computer Forensics course to investigate a variety of cases, including fraud, infidelity, and missing persons. This course provides students with a foundation in private investigation and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them investigate cases.
Security Operations Manager
A Security Operations Manager may use the skills and techniques learned in an Intermediate Computer Forensics course to manage security operations for organizations. This course provides students with a foundation in security operations and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them manage security operations.
Cybersecurity Manager
A Cybersecurity Manager may use the skills and techniques learned in an Intermediate Computer Forensics course to manage cybersecurity programs for organizations. This course provides students with a foundation in cybersecurity and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them manage cybersecurity programs.
Information Security Manager
An Information Security Manager may use the skills and techniques learned in an Intermediate Computer Forensics course to manage information security programs for organizations. This course provides students with a foundation in information security and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them manage information security programs.
Network Security Manager
A Network Security Manager may use the skills and techniques learned in an Intermediate Computer Forensics course to manage network security programs for organizations. This course provides students with a foundation in network security and computer forensics. This course also provides students with hands-on experience using computer forensics software and techniques, which can help them manage network security programs.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Intermediate Computer Forensics.
Provides a practical guide to computer forensics investigations, covering the process of acquiring, analyzing, and presenting digital evidence. It also includes case studies and examples to illustrate the application of computer forensics techniques.
Provides a comprehensive overview of the forensic examination of digital evidence. It valuable resource for students and practitioners who want to learn more about the latest techniques in digital forensics.
Provides a comprehensive overview of memory forensics. It valuable resource for students and practitioners who want to learn more about the latest techniques in memory forensics.
Provides a hands-on guide to digital forensics, covering the process of acquiring, analyzing, and presenting digital evidence. It includes case studies and examples to illustrate the practical application of digital forensics techniques.
Provides an introduction to computer forensics and cyber crime. It covers the basics of digital investigations, including how to acquire, analyze, and present digital evidence. It good introduction to computer forensics for those with little or no experience.
Provides a comprehensive overview of digital evidence and computer crime. It covers the forensic science of digital investigations, including how to acquire, analyze, and present digital evidence. It also covers the legal and ethical issues surrounding digital evidence.
Provides a comprehensive overview of digital forensics analysis and investigation. It covers the process of acquiring, analyzing, and presenting digital evidence. It also covers the legal and ethical issues surrounding digital forensics.
Provides a comprehensive overview of computer forensics incident response and investigation. It covers the process of responding to and investigating digital incidents. It also covers the legal and ethical issues surrounding digital forensics.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Intermediate Computer Forensics.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser