Computer Forensics

Computer forensics is the process of examining computers, to find and analyze data. This can include recovering deleted files, tracking where and when data was accessed, and understanding how a security incident happened. Essentially, it's a technical way to dig into computer systems to figure out what happened to specific data and how it got there—whether due to accidental deletion, malware, or unauthorized access. This helps in tracing and resolving issues that impact data security or system integrity.

Course Focus Area

This computer forensics training course covers a range of essential topics, including data recovery, malware analysis, Windows, Linux and network forensics. Participants will explore investigative techniques used to gather and analyze digital evidence, providing a streamlined approach to uncovering the complexities of cyber incidents.

Expected Audience

  • Individuals already working in information technology who want to specialize in computer forensics

  • Professionals looking to enhance their skills in investigating and mitigating cyber threats

  • Law Enforcement Personnel or agents involved in cybercrime investigations

  • Students studying computer science, information security, or related fields

What you will Learn ?

Section 1: Introduction to Computer Forensics

  • Computer Forensics Fundamentals

  • Roles and Responsibilities of the Cybercrime Investigator

  • Phases of computer forensics investigation

  • Types of digital evidences

Section 2: Windows Forensics

  • File systems and file recovery

  • Windows Security, System and Application event analysis

  • Registry analysis

  • Windows memory analysis

Section 3: Linux Forensics

  • Volatile and Non-Volatile Data in Linux

  • Linux logging basics

  • Linux file system image analysis

  • Memory Forensics using Volatility

Section 4: Network Forensics

  • Network data evidence

  • Logging fundamentals

  • TCP and UDP protocol analysis

  • Network traffic analysis and IoCs identification

Section 5: Malware Forensics

  • Malware Forensics Fundamentals

  • Static malware analysis

  • Dynamic malware analysis

Section 6: Email and Internet History Analysis

  • Introduction to the Email System

  • Host and web based e-mail extraction

  • Email header analysis

  • Internet explorer, chrome and firefox analysis

  • Cookies, cache and other artifacts

  • URL obfuscation

Pre-requisites

  1. A basic knowledge of computer science and experience in IT infrastructure.

  2. foundational understanding of cybersecurity principles, networking concepts, and incident response techniques

  3. Familiarity with operating systems and networking principles

Course Reference code

For any communications related to this course, please mention the course reference code as DEF-T-DCF