Computer Forensics
Computer forensics is the process of examining computers, to find and analyze data. This can include recovering deleted files, tracking where and when data was accessed, and understanding how a security incident happened. Essentially, it's a technical way to dig into computer systems to figure out what happened to specific data and how it got there—whether due to accidental deletion, malware, or unauthorized access. This helps in tracing and resolving issues that impact data security or system integrity.
Course Focus Area
This computer forensics training course covers a range of essential topics, including data recovery, malware analysis, Windows, Linux and network forensics. Participants will explore investigative techniques used to gather and analyze digital evidence, providing a streamlined approach to uncovering the complexities of cyber incidents.
Expected Audience
Individuals already working in information technology who want to specialize in computer forensics
Professionals looking to enhance their skills in investigating and mitigating cyber threats
Law Enforcement Personnel or agents involved in cybercrime investigations
Students studying computer science, information security, or related fields
What you will Learn ?
Section 1: Introduction to Computer Forensics
Computer Forensics Fundamentals
Roles and Responsibilities of the Cybercrime Investigator
Phases of computer forensics investigation
Types of digital evidences
Section 2: Windows Forensics
File systems and file recovery
Windows Security, System and Application event analysis
Registry analysis
Windows memory analysis
Section 3: Linux Forensics
Volatile and Non-Volatile Data in Linux
Linux logging basics
Linux file system image analysis
Memory Forensics using Volatility
Section 4: Network Forensics
Network data evidence
Logging fundamentals
TCP and UDP protocol analysis
Network traffic analysis and IoCs identification
Section 5: Malware Forensics
Malware Forensics Fundamentals
Static malware analysis
Dynamic malware analysis
Section 6: Email and Internet History Analysis
Introduction to the Email System
Host and web based e-mail extraction
Email header analysis
Internet explorer, chrome and firefox analysis
Cookies, cache and other artifacts
URL obfuscation
Pre-requisites
A basic knowledge of computer science and experience in IT infrastructure.
foundational understanding of cybersecurity principles, networking concepts, and incident response techniques
Familiarity with operating systems and networking principles
Course Reference code
For any communications related to this course, please mention the course reference code as DEF-T-DCF