We may earn an affiliate commission when you visit our partners.
Take this course
John Boyle

Computer Forensics Fundamentals will provide: 

  • Foundational concepts about the computer forensics field

  • Understanding of hexadecimal and hashing in relations to computer forensics

  • An introductory understanding of what computer forensics is

  • The process of collecting digital evidence

  • How do create, mount and explore forensic digital images

  • Considerations for first responders to a computer crime scene

Read more

Computer Forensics Fundamentals will provide: 

  • Foundational concepts about the computer forensics field

  • Understanding of hexadecimal and hashing in relations to computer forensics

  • An introductory understanding of what computer forensics is

  • The process of collecting digital evidence

  • How do create, mount and explore forensic digital images

  • Considerations for first responders to a computer crime scene

    The course will consist of presentations to explain the concepts of computer forensics as well as demonstrations of proper collections of digital evidence. 

       This course is designed for anyone with an interest computer forensics to get a taste of the real world of digital forensics examination. 

       As an introductory course it will consist of presentations, hands on lessons and quizzes. 

Enroll now

What's inside

Learning objectives

  • Understanding what computer forensics is
  • Be able to make a forensics image from a drive
  • Be able to mount a drive for analysis
  • Understand basic artifacts of the operating system
  • Understand basics of first responder to scene and what should be done to secure the digital evidence

Syllabus

Understanding what computer forensics is

Introduction and layout of the course. What will be taught and how it will be taught

The course introduction giving a working definition of what computer forensics is, the steps of basic computer forensics and ways computers can be used to commit a crime.

Read more

Quiz on what was covered in introduction

This lecture covers what hash files are and how they are used in different ways in computer forensics.

This is a lab exercise to the understanding hash files better. You can create your own txt files or download the ones in the lecture extras section.  If the website in the PDF file is not available use the following website to complete the exercise: www.whatsmyip.org/hash-generator/

This lecture covers the hexadecimal numbering system and how it is used in computer forensics.

This is a lab exercise to understand hex editor software and file headers better. Download the 3 supplemental files and follow the instructions in the lab.

Quiz about understanding of hash values and hexadecimal numbers

This lecture covers the physical and logic copies of hardware, slack space and RAM

This lecture covers hardware devices, file systems and operating systems.

Quiz on hardware storage devices, RAM and locations/types of evidence

An overview of the forensics imaging software used to make, mount and explorer forensic images.

Demonstration on how to add evidence to a case

Demonstration of how to mount and image as a drive letter

Over view demonstration of exploring an image

This lesson covers procedures for first responders to a scene collecting evidence.

Quiz on response to a crime scene

Wrap up and recommendations on where to go from here and in the future.

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Beginner-friendly introduction to the foundational steps computer forensics and the world of digital forensics examination
Taught by experienced instructor John Boyle who developed this course to give learners a taste of the real world
Develops foundational knowledge of basic computer forensics concepts and skills, such as imaging and exploring drives
Hands-on labs demonstrate best practices and provide an interactive learning experience
Supplemental first responder lesson provides valuable guidance for initial steps at a scene
Prerequisites are not explicitly stated, but the course assumes basic computer literacy

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Reviews summary

Solid introduction to computer forensics fundamentals

According to learners, "Computer Forensics Fundamentals" is a largely positive course, particularly well-suited for absolute beginners in the field. Students frequently praise the clear explanations of foundational concepts like hashing, hexadecimal, and file systems. Many highlight the practical aspects, including hands-on demonstrations for creating and mounting forensic images, and valuable insights into first responder procedures. While some find the content too basic for those with prior IT experience or note that certain tools and presentations may feel dated, the course consistently delivers a strong foundational understanding that prepares learners for more advanced study.
Offers valuable demonstrations and exercises for practical application.
"The hands-on demos for creating and mounting images were incredibly useful."
"I particularly enjoyed the practical aspects, like learning how to handle digital evidence as a first responder."
"Outstanding introductory course! The lab exercises on hash files and using a hex editor were fantastic for understanding the underlying data."
"The demonstrations were the strongest part, making complex processes like disk imaging understandable."
Delivers core concepts with notable clarity and effectiveness.
"The explanations on hashing and hexadecimal were surprisingly clear, and the hands-on demos for creating and mounting images were incredibly useful."
"I particularly enjoyed the practical aspects, like learning how to handle digital evidence as a first responder."
"Outstanding introductory course! The lab exercises on hash files and using a hex editor were fantastic for understanding the underlying data."
"Very clear and concise for an introduction. The demonstrations were the strongest part, making complex processes like disk imaging understandable."
Highly recommended for individuals with little to no prior experience.
"Excellent course for true beginners! The instructor simplifies complex topics without dumbing them down."
"This course provided a really solid foundation in the basics of computer forensics."
"A very good primer on computer forensics. The pace was just right for me, a complete novice."
"I found it moves a bit slow. If you have any prior IT experience, you might find it moves a bit slow."
Pacing suits beginners, but lacks depth for experienced learners.
"Decent overview. It's definitely for absolute beginners, as I found much of the content to be very basic."
"As someone with a networking background, I found this course too basic. It doesn't delve deep enough for me."
"I wish there were more advanced topics or case studies, but for fundamentals, it's really solid."
Some tools or presentation elements may seem a bit behind the times.
"Some of the tools felt a little dated, but they still served their purpose for understanding the concepts."
"The software installation part felt a bit clunky, and some links were broken which was frustrating."
"The software setup was a pain, and the content felt a little dated in terms of presentation style."
"My only minor critique is that some of the visual aids in the presentations could be updated for a crisper look."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Computer Forensics Fundamentals with these activities:
Organize and review your notes and materials
Staying organized will help students keep track of the information they are learning and make it easier to review for exams.
Show steps
  • Create a system for organizing your notes
  • Review your notes regularly
Review hash functions
Reviewing hash functions will strengthen foundational knowledge and make it easier to undertand how they are used in computer forensics.
Browse courses on Hash Functions
Show steps
  • Read the lecture notes on hash functions.
  • Complete the practice exercises on hash functions.
Guided Tutorials: Hashing and Hexadecimal in Computer Forensics
Review the basics of hashing and hexadecimal to prepare for the course content on digital evidence analysis.
Show steps
  • Watch the provided video tutorials on hashing and hexadecimal concepts.
  • Complete the hands-on exercises to apply your understanding.
  • Take the quiz to assess your comprehension of the materials.
11 other activities
Expand to see all activities and additional details
Show all 14 activities
Practice creating a forensic disk image
Practicing forensic disk imaging will not only help solidify this skill, but also increase confidence in performing this procedure.
Browse courses on Computer Forensics
Show steps
  • Set up a virtual machine
  • Install a forensic imaging tool
  • Create a forensic disk image of the virtual machine
Watch video tutorials on computer forensics
Video tutorials can provide students with a more engaging and interactive way to learn about computer forensics.
Browse courses on Computer Forensics
Show steps
  • Find video tutorials online
  • Watch the tutorials
  • Take notes
Complete practice exercises on computer forensics
Practice exercises will help students reinforce their understanding of the concepts and techniques of computer forensics.
Browse courses on Computer Forensics
Show steps
  • Find practice exercises online
  • Complete the exercises
  • Review your answers
Join a study group or participate in online forums
Engaging with peers can help students learn from each other and reinforce their understanding of the course material.
Browse courses on Computer Forensics
Show steps
  • Find a study group or online forum
  • Participate in discussions
Practice Drills: Creating and Mounting Forensic Images
Engage in hands-on practice to develop proficiency in creating and mounting forensic images.
Browse courses on Image Acquisition
Show steps
  • Set up the forensic imaging software.
  • Create a forensic image of a sample drive.
  • Mount the forensic image and explore its contents.
  • Repeat the process with different types of drives or file systems (optional).
Peer Session: First Responder Procedures
Engage with peers to discuss and reinforce procedures for first responders to a computer crime scene.
Show steps
  • Join a study group or discussion forum.
  • Participate in discussions and share your perspectives on first responder procedures.
  • Conduct mock exercises to practice securing digital evidence (optional).
Find a mentor in the field of computer forensics
Finding a mentor will provide students with an opportunity to gain valuable insights and guidance from an experienced professional in the field.
Browse courses on Computer Forensics
Show steps
  • Attend industry events
  • Network with professionals on LinkedIn
  • Reach out to professors or instructors
Create a presentation on the basics of computer forensics
Creating a presentation on the basics of computer forensics will help solidify the concepts students have learned and enhance their ability to explain them to others.
Browse courses on Computer Forensics
Show steps
  • Practice giving your presentation
  • Choose a topic for your presentation
  • Research your topic
  • Create a storyboard for your presentation
  • Develop the content for your slides
Project: Analyze a Forensic Image
Apply your understanding of forensic imaging by analyzing a sample forensic image and identifying artifacts of interest.
Show steps
  • Obtain a sample forensic image.
  • Mount the image and explore its contents.
  • Identify and document artifacts related to the operating system, applications, and user activity.
  • Write a report summarizing your findings (optional).
Workshop: Advanced Forensic Analysis Techniques
Attend a workshop to refine your forensic analysis skills and learn about advanced techniques.
Show steps
  • Identify relevant workshops and register for participation.
  • Attend the workshop and actively participate in the sessions.
  • Engage with experts and fellow attendees to expand your knowledge.
  • Apply the learned techniques to your own forensic investigations (optional).
Volunteer: Assisting with Forensic Investigations
Gain practical experience by volunteering to assist with forensic investigations under the supervision of professionals.
Show steps
  • Identify organizations or law enforcement agencies that offer volunteer opportunities in computer forensics.
  • Inquire about available opportunities and meet eligibility requirements.
  • Assist with forensic investigations under the guidance of experienced professionals.
  • Document your experiences and reflect on the practical aspects of computer forensics (optional).

Career center

Learners who complete Computer Forensics Fundamentals will develop knowledge and skills that may be useful to these careers:
Computer Forensics Investigator
Computer Forensics Investigators are responsible for the collection, preservation, and examination of digital evidence. They use their knowledge of computer forensics to investigate computer crimes and to help law enforcement and prosecution teams build strong cases.
Forensic Computer Analyst
Forensic Computer Analysts specialize in the examination and analysis of computer data in legal investigations. They use their skills to uncover evidence of crimes and to help law enforcement and prosecution teams build strong cases. The Computer Forensics Fundamentals course can provide a solid foundation in the principles and techniques of computer forensics, which can be essential for Forensic Computer Analysts.
Incident Responder
Incident Responders are responsible for responding to and investigating security incidents, including those involving computer systems. They use their skills to identify the source of an incident, contain the damage, and recover lost data. The Computer Forensics Fundamentals course can provide a strong foundation in the principles and techniques of computer forensics, which can be helpful for Incident Responders who need to investigate and respond to computer security incidents.
Forensic Science Technician
A Forensic Science Technician is responsible for collecting, preserving, and analyzing evidence in criminal investigations. This can include digital evidence, such as computer data. The Computer Forensics Fundamentals course can provide a strong foundation in the principles and techniques of computer forensics, which can be helpful for Forensic Science Technicians who need to collect and analyze digital evidence.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for the protection of computer systems and networks from cyberattacks. They use their knowledge of computer forensics to investigate and respond to cybersecurity incidents and to identify and mitigate security risks.
Database Administrator
Database Administrators are responsible for the management and maintenance of databases. They use their knowledge of computer forensics to investigate and resolve database corruption and to identify and mitigate security risks.
Information Security Manager
Information Security Managers are responsible for the development and implementation of security policies and procedures. They use their knowledge of computer forensics to investigate and respond to security breaches and to identify and mitigate security risks.
Data Analyst
Data Analysts are responsible for collecting, cleaning, and analyzing data to identify trends and patterns. They use their knowledge of computer forensics to investigate data breaches and to identify and mitigate security risks.
Intelligence Analyst
Intelligence Analysts are responsible for the collection, analysis, and interpretation of intelligence information. They use their knowledge of computer forensics to investigate cyber threats and to identify and mitigate security risks.
Technical Support Specialist
Technical Support Specialists provide technical support to users of computer systems and networks. They use their knowledge of computer forensics to troubleshoot and resolve technical problems and to identify and mitigate security risks.
Network Engineer
Network Engineers are responsible for the design, implementation, and maintenance of computer networks. They use their knowledge of computer forensics to investigate and resolve network problems and to identify and mitigate security risks.
Computer Security Analyst
Computer Security Analysts plan, implement, and maintain security measures to protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. These professionals use their knowledge of computer forensics to investigate and respond to security breaches and to identify vulnerabilities in computer systems.
Security Engineer
Security Engineers design, implement, and maintain security systems to protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of computer forensics to investigate and respond to security breaches and to identify vulnerabilities in computer systems.
Network Security Engineer
Network Security Engineers are responsible for protecting the confidentiality, integrity, and availability of computer networks. They use their knowledge of computer forensics to investigate and respond to network security incidents and to identify vulnerabilities in network systems.
Systems Administrator
Systems Administrators are responsible for the day-to-day operation and maintenance of computer systems and networks. They use their knowledge of computer forensics to investigate and resolve system failures and to identify and mitigate security risks.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Computer Forensics Fundamentals.
Provides a comprehensive overview of incident response and computer forensics, including topics such as incident handling and forensics analysis.
Provides a comprehensive overview of digital evidence and computer crime, including topics such as digital forensics and cybercrime investigation.
Provides a comprehensive overview of cybercrime and digital forensics, covering topics such as cybercrime investigation and digital forensics analysis.
Provides a comprehensive overview of forensic analysis, including topics such as digital evidence collection, cybercrime investigation, and incident response.
Provides an in-depth look at operating system forensics, covering topics such as Windows, Linux, and Mac OS forensics.
Provides advanced techniques for memory forensics, including topics such as memory acquisition and analysis.
Provides advanced techniques in digital forensics, including topics such as network forensics and cloud forensics.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser