We may earn an affiliate commission when you visit our partners.
Course image
Yin Pan

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.

Read more

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.

In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

What you'll learn

  • Court admissibility investigative procedures
  • Attributes of various Windows and Unix/Linux file systems and file recovery processes
  • To identify and apply appropriate forensics tools to acquire, preserve and analyze system image
  • Review and critique a forensics report

What's inside

Learning objectives

  • Court admissibility investigative procedures
  • Attributes of various windows and unix/linux file systems and file recovery processes
  • To identify and apply appropriate forensics tools to acquire, preserve and analyze system image
  • Review and critique a forensics report

Syllabus

Week 1: Digital Forensics Fundamentals Introduction to Incident response digital forensics four-step procedure Concepts: computer/network/Internet forensic and anti-forensics Week 2: Unix/Linux fundamentals Unix/Linux incident response tools Unix/Linux file systems (Ext2/Ext3) Week 3: Unix/Linux Forensic Investigation Unix/Linux forensics investigation steps and technologies Unix/Linux forensics case studies Week 4: Windows Incident Response Memory forensics Windows incident response tools Week 5: Windows fundamentals Windows file systems Windows forensics tools Week 6: Windows Forensic Investigation Windows acquisition Windows forensics analysis – registry and other artifacts Week 7: Advanced artifacts Loadable kernel module rootkits Steganography hiding, detection and analysis Week 8: Review and Everything Together

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Designed for professionals seeking to enter or advance in cybersecurity, preparing learners with the skills to investigate computer-related crimes and obtain evidence for legal proceedings
Covers core forensics procedures to ensure the admissibility of evidence in court, meeting industry standards for digital forensics investigations
Combines theory and practice, equipping learners with the ability to perform forensic investigations on both Unix/Linux and Windows systems, enhancing their versatility in the field
Taught by Yin Pan, a recognized expert in digital forensics, providing learners with insights from an industry leader
Part of the RITx Cybersecurity MicroMasters Program, offering a structured learning path for career advancement in cybersecurity
Requires learners to have a foundational understanding of computer systems and networks, ensuring a baseline of knowledge for effective learning

Save this course

Save Computer Forensics to your list so you can find it easily later:
Save

Reviews summary

In-depth forensics introduction

Learners say this introduction to computer forensics course covers Windows, Linux, and mobile platforms. They appreciate learning not only how to use forensic tools but also when and why to use them. Students say the course is perfect for beginners, and the instructor is knowledgeable.
Instructor is knowledgeable.
"The instructor is knowledgeable,..."
Covers Windows, Linux, and mobile platforms.
"The course covers Windows, Linux, and a bit mobile platforms,..."
Learn how to use forensic tools.
"... you'll learn not only how to use the tools, but also when to use them and why to use them."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Computer Forensics with these activities:
Organize and review your materials
Create a robust collection of materials that will support you throughout this course
Show steps
  • Gather your syllabus, lecture notes, and any assigned readings
  • Organize your materials in a way that makes sense to you
  • Review your materials regularly to reinforce your learning
Follow tutorials on forensics tools and techniques
Gain practical experience by working through step-by-step tutorials on industry-standard forensics tools
Show steps
  • Search for tutorials on specific tools or techniques
  • Follow the instructions and complete the exercises
  • Explore additional resources to expand your understanding
Practice your digital forensic skills
Reinforce your understanding of the concepts and techniques covered in this course
Show steps
  • Set up a virtual machine or use an online forensics tool
  • Practice acquiring, preserving, and analyzing digital evidence
  • Test your skills by completing online challenges or participating in CTF events
Show all three activities

Career center

Learners who complete Computer Forensics will develop knowledge and skills that may be useful to these careers:
Forensic Science Technician
Forensic science technicians play a key role in the criminal justice system by collecting and analyzing evidence in a variety of cases, including computer-related crimes. This course would be very helpful for building a strong foundation in computer forensics investigation. It covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Digital Forensics Investigator
Digital forensics investigators use their knowledge of digital forensics and computer security to investigate computer-related crimes and provide expert testimony in court This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Computer Forensics Analyst
Computer forensics analysts investigate computer-related crimes and provide expert testimony in court This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Systems Administrator
Systems administrators use their knowledge of digital forensics and computer security to manage and secure their organization's IT systems. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Cybersecurity Analyst
Cybersecurity analysts use their knowledge of digital forensics and computer security to protect their organization's networks and systems from cyberattacks. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Incident Responder
Incident responders use their knowledge of digital forensics and computer security to respond to and investigate computer security incidents. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Network Security Analyst
Network security analysts use their knowledge of digital forensics and computer security to identify and address and computer security risks. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Malware Analyst
Malware analysts use their knowledge of digital forensics and computer security to investigate malware and other malicious software. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Cybersecurity Consultant
Cybersecurity consultants use their knowledge of digital forensics and computer security to help organizations improve their cybersecurity posture. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Ethical Hacker
Ethical hackers use their knowledge of digital forensics and computer security to help organizations find and fix security vulnerabilities. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Computer Security Specialist
Computer security specialists use their knowledge of digital forensics and computer security to protect their organization's data and systems from cyberattacks. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Network Administrator
Network administrators use their knowledge of digital forensics and computer security to manage and secure their organization's networks and systems. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Data Forensics Analyst
Data forensics analysts use their knowledge of digital forensics and computer security to investigate data breaches and other computer-related crimes. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Information Security Analyst
Information security analysts use their knowledge of digital forensics and computer security to protect their organization's data and systems from cyberattacks. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.
Security Engineer
Security engineers use their knowledge of digital forensics and computer security to design and implement security solutions for their organization. This course may be useful for building a strong foundation in computer forensics investigation. This course covers the fundamentals of digital forensics, Unix/Linux and Windows forensics, and advanced topics such as steganography.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Computer Forensics.
This practical guide to Windows forensics provides detailed instructions on how to use a variety of tools and techniques to investigate digital evidence.
This boook provides a detailed overview of the digital forensics process and the tools needed to conduct a thorough investigation.
comprehensive reference guide to file system forensics, providing detailed information on a variety of file systems and how to analyze them.
Provides a detailed and comprehensive introduction to the principles and practices of computer forensics. It valuable resource for anyone interested in learning more about the field.
Provides a detailed and comprehensive overview of incident response and computer forensics. It valuable resource for anyone interested in learning more about the field.
provides a comprehensive overview of malware forensics, covering topics such as malware analysis, threat intelligence, and incident response.
This boook provides a practical guide to open source intelligence (OSINT), covering techniques for gathering and analyzing information from a variety of online sources.
Provides a comprehensive overview of advanced Windows forensics techniques. It valuable resource for anyone interested in learning more about how to investigate digital crimes on Windows 10 systems.
provides a comprehensive overview of network forensics, covering topics such as network traffic analysis, intrusion detection, and incident response.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Computer Forensics.
Computer Forensics Fundamentals
Most relevant
Digital Forensics Essentials (DFE)
Most relevant
Incident Forensics: Digital Media Acquisition
Most relevant
Enumerating the Network Infrastructure as a Forensics...
Most relevant
Digital Forensics and Cyber-Crime Investigation
Most relevant
Digital Forensics Concepts
Most relevant
Specialized DFIR: Windows File System and Browser...
Most relevant
Digital Forensics Essentials (DFE)
Most relevant
Intermediate Computer Forensics
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser