Last updated 9/2022Course Language EnglishCourse Caption Course Length 02:45:46 to be exact 9946 seconds!Number of Lectures 27
This course includes:
3 hours hours of on-demand video
Full lifetime access
Access on mobile and TV
Certificate of completion
1 additional resources
Digital Forensics Fundamentals
Computer Forensics, Mobile Forensics, Network Forensics and Cloud Forensics
Digital Forensic Toolkits (12 tutorials)
Digital Forensics Analysis
The Digital Forensics Process, Chain of Custody, Preservation of Data, Order of Volatility, Etc.
Digital Forensics Investigations
Operating Systems, Memory Extraction, Cryptography, etc.
Free Digital Forensics Tools
Digital forensics is field of study within cybersecurity that focuses on the extraction, preservation and analysis of digital information and data. Digital forensics is commonly used in law enforcement, government and the business sector for various purposes. ---Cybersecurity is one of the fastest growing fields of study within the computer science industry with expected job growth of 33% over the next 10 years according to the Bureau of Labor Statistics. Additionally, job postings for cybersecurity roles have already drastically increased ahead of schedule pointing to the possibility that the industry may be growing faster than anyone anticipated. Digital forensics is an aspect of cybersecurity that involves the acquisition, recover and analysis of data found on information systems. Digital forensics is commonly used by law enforcement, government and businesses throughout the world. Whether the goal is to catch criminals or uncover vulnerabilities in an information system, digital forensics is an important field of study that can be viewed as one of the foundational skills of cybersecurity.By learning digital forensics you will gain a deep understanding of many foundational elements of cybersecurity. This includes understanding file systems, operating systems, cryptography, types of cyber attacks, threat analysis, data visualization, analytic methodologies, forensic toolkits and much more. Learning digital forensics allows you to approach cybersecurity from the ground up, giving you a much better understanding of how things work behind the scenes. This will become an invaluable skill and knowledge base that you will carry with you throughout your career.In this program you will learn about the four types of digital forensics and how they are used in the real world. Each use case for digital forensics requires different rules and regulations to follow. Understanding concepts such as chain of custody, order of volatility and various legal standards are important when conducting digital forensics. Additionally, you will learn foundational concepts about capturing digital data such as forensic imaging, file systems, operating systems, cryptography and the digital forensics process. Lastly, we will walk you through 12 tutorials using free forensic tools that you can start using today to practice your digital forensics skills. These tools will teach you how to capture hard drive data, recover deleted files, forensically analyze network data, extract data from mobile devices and much more. By the end of this program you will not only know the fundamentals of digital forensics but you will be able to actually conduct various types of digital forensic tasks and functions with real world applications.Who this course is for:Those looking to advance their knowledge and skills around digital forensics.
Course Content:
Sections are minimized for better readability, click the section title to view the course content
6 Lectures | 31:46
What is Digital Forensics
01:42
Digital forensics is an element of cybersecurity that focuses on the acquisition, recovery, investigation and analysis of digital material found on electronic devices, computer networks, cloud resources and mobile devices.
Types of Digital Forensics
02:59
There are four primary types of digital forensics which includes computer forensics, mobile forensics, network forensics and cloud forensics.
Use Cases for Digital Forensics
10:13
Digital forensics is commonly used in law enforcement but it is also used in military, government and business environments. Here you will learn about the various purposes for digital forensics in each type of organization.
Information Security
05:30
Within the field of information security there is a concept known as the CIA Triad which stands for Confidentiality, Integrity and Availability. Confidentiality ensures that information is only viewed by those who are supposed to have access to it. Integrity ensures that the information that is transferred is intact and remains unmodified. Availability ensures that data is readily available to those who are authorized to access it. Different elements of the CIA Triad will be of more interest to different groups depending on what threat actor is being discussed.
Cyber Attacks
07:37
Cyber warfare, attacks and intrusions have been around since the 1980’s when computers and the internet were still in their infancy. As information technology has proliferated around the world so have the inherent vulnerabilities that come with it. As more individuals, groups and nation states gain access to this technology they naturally learn how to exploit computers for military, intelligence and criminal applications.
Cyber Attack Case Study
03:45
This section provides extensive detail about a recent cyber attack launched by Russia against Ukraine.
8 Lectures | 56:23
Memory & Storage
08:54
The most common type of image acquisition is called “bit stream disk to image”. This type of acquisition involves creating an exact replica or clone of the original drive. You will learn how to do this later in the course.
Operating Systems
03:07
Operating Systems allow the user to manage all the programs and applications on a computer or device. Without an operating system a computer would not be able to function in the way we are commonly used to. The operating system is used for essential tasks such as booting, memory management, loading, executing programs, disk management and the the user interface.
Cryptography
06:18
Cryptography is a method of securing information whether it is at rest or in transit. Without cryptography hackers would be able to see all of your information in what is called plain text. This means that your usernames, passwords and other important information would be clearly visible if someone could access your network or device. You will learn how to view these plain text messages in the tutorials on network forensics.
The Digital Forensics Process
08:00
The digital forensics process is a systematic tool that can be used by investigators to safely and effectively conduct digital forensics tasks from start to finish.
Computer Forensics (Hardware)
07:47
Computer forensics in this section is to be understood as hardware data forensics and the extraction techniques associated with these technologies. This is what is commonly referred to when discussing digital forensics although by now you have learned that the field is much more dynamic.
Mobile Forensics
09:22
Digital forensics on mobile devices and cell phones has been a growing field over the last two decades. In many cases mobile devices carry much more useful evidence that can be used especially in the case of law enforcement. Mobile devices are filled with valuable information such as contacts, text messages, GPS data, photos & videos, meta data, network data, application data and other personally identifiable information that can be used for analysis.
Network Forensics
05:16
Network forensics is the aspect of digital forensics that involves investigating computer network traffic and network data to form assessments and draw conclusions about criminal behavior, cybersecurity events and to gather information. Through network forensics investigators can view file transfers, messages, emails, web traffic, credentials and much more.
Cloud Forensics
07:39
Cloud computing is a service that users are able to interact with over a computer network. It allows users to access software, media and digital infrastructure without having to install services on a local device or server. This allows for the virtualization of software, services, platforms and infrastructure over the internet.
12 Lectures | 01:07:13
Tool #1
13:14
This tutorial covers an open source digital forensics platform used by law enforcement, military, business and academic clients. This tool is a feature rich platform that allows for multiple add-ons for each specific industry. The tool comes equipped with the capability to allow the examiner to easily investigate computer hardware and mobile devices. Features include email analysis, meta data extraction, robust file system analysis, timeline analysis and registry analysis.
Tool #2 (Network Forensics)
08:24
This tool is a network protocol analyzer which is a tool that allows the user to monitor, track and analyze activity on a network. It is the industry standard for government, corporate and law enforcement clients around the world. This tool provides a feature rich platform that enables the user to capture live network traffic from a variety of sources. It is equipped with dozens of features such as VoIP analysis, protocol decryption, multiple search filters and an easy to use graphical user interface.
Tool #3 (Network Forensics)
06:52
This tool is another highly useful open source tool for digital forensics. It is a Network Forensics Analysis Tool that is used to capture packet captures and other valuable network data for an investigation. This tool functions as a passive network sniffer or packet capturing tool in order to detect operating systems, sessions, hostnames, open ports and more.
Tool #4
10:42
This tool is a free open source data preview and imaging software use for digital forensics. This tool allows the user to copy image files of devices in order to examine the data without making changes to the original evidence. This is important for both data preservation and chain of custody reasons in an investigation.
Tool #5
03:42
This tool is a free software tool that you can use to quickly copy a physical drive. It is a very simple tool with less functionality than the previous tools but offers great value by allowing the user the ability to conduct their capture in a fast and low profile manner.
Tool #6 (Mobile Forensics)
01:48
A free software tool for quickly capturing mobile disk images for iOS, Android and other removable media sources. The software combines computer and mobile data acquisition allowing you to use one centralized tool for various types of data acquisition. The software offers several options for quick capture or for full disk capture and has the ability to root devices as needed.
Tool #7 (Mobile Forensics)
03:35
This is a free software tool designed to collect forensic data from various mobile devices on the market. This tool creates a read only forensic acquisition of mobile device data and offers several features such as password cracking for various password types, application decoders and communication data. It is an easy to use software that provides a simple and straight forward graphical user interface to quickly extract data from a mobile device.
Tool #8 (Browser Forensics)
03:07
This tool allows the user to extract all of the browsing history on a device from multiple internet browsers. The tool extracts all data related to browsing history and displays it in one area where it can easily be viewed and analyzed. The most common browsers that are extracted are Mozilla Firefox, Google Chrome, Internet Explorer, Microsoft Edge but the tool will extract data from others.
Tool #9
02:37
This tool allows the investigator to discover the last known resources that were being used on a specific information system. This can include applications that were running, files and folders that were opened, deleted files and folders, utilities being used, network and connection data, system errors and much more.
Tool #10 (Network Forensics)
04:26
Network forensics tool that is ideal for those who are not familiar with using the command line interface.
Tool #11 (USB Forensics)
04:37
This tool is a digital forensics software that allows you to discover USB and external drive artifacts that may be hidden from plain view. Whenever you use a USB drive there are dozens of digital artifacts that are left behind. These artifacts can be used to determine if a specific device was used and what activity it was involved in.
Tool #12 (Web Forensics)
04:09
This tool is different from the other forensics tools in that it is a web based tool used to gather information about websites and IP addresses. Sometimes digital forensics involves investigating websites, IP addresses and other network devices that are connected through the internet. Finding information about these digital assets may prove to be difficult if you are not able to reach the owner or administrator of the website. Internet facing websites may also be used for criminal activity which can create a need to gather more information about the site such as what internet service provider it uses, the physical location of the servers and domain registration information.
1 Lectures | 10:24
15 Additional Digital Forensics Tools
10:24
4.46
(8 course ratings)
1
0/8
2
0/8
3
1/8
4
1/8
5
7/8
JOIN OUR WHATSAPP GROUP TO GET LATEST COUPON AS SOON AS UPDATED
If you like to get inspired by great web projects, you should check out Made with Javascript. If you have a project that you wish to share with the world, feel free to submit your project on Made with Javascript Club website.
Free Online Tools And Converters for your use
URL Encoder
Input a string of text or a URL and encode the entered string
FAQ: Udemy Free course Most frequent questions and answers
Does Udemy offer Free Udemy coupons?
Yes, Udemy is the largest online education platform, with the broadest selection of video-on-demand courses and qualified instructors available to meet your needs. At theprogrammingbuddy.club we curate the latest udemy coupons, their expiry, and the number of uses left of these udemy coupons.
How to get free Udemy courses?
There are two ways to get free Udemy courses:
Go to udemy.com and search for your desired course category. Then select free from the filter options.
You can also get paid courses for free if you have a coupon. You can head to theprogrammingbuddy.club, where you can get a daily udemy paid course for free.
How to get Udemy Certificates for free?
Udemy offers certification on completion of each course. In order to receive a certificate of completion from Udemy, you need to complete your course 100%. There is a simple hack, you can open a video and jump on the timeline to complete a lecture.
To download the certificate from Udemy, you need to head over to your account on a desktop browser. Udemy certificates can't be accessed on the mobile app.
Do Udemy courses expire?
No, once you enroll, you will have lifetime access to the course. You can complete the course on your schedule.
Why are the Udemy instructors giving away free Udemy Coupons?
Every instructor has worked for hours on each of their courses. As new courses get launched, the instructors have no way to get their course in front of an audience to get some feedback. So, instructors share free coupons for their courses to get feedback from the students. We attheprogrammingbuddy.club work with these instructors to get their courses available to our buddies.
Is Udemy safe to use?
Yes, payments on Udemy are safe. It is no different than paying for other services on an application or website and inputting your payment information before receiving your goods. Just be sure to keep your account secure, do not share your udemy accounts.
Can Udemy courses get you a job?
Earning a skill is more valuable than earning a job these days. Skills are your most valuable asset. They can help you qualify for jobs you want and get promoted to more advanced positions within your organization. Unfortunately, it is difficult for many people to balance taking courses with work and family obligations. We have had many students, who have taken just Udemy courses, started a job as well as started freelancing with the skills they have learned.