Digital Forensics Foudation

In-Depth Course Information for Digital Forensics Path

Incident Forensics: Digital Media Acquisition


The acquisition of digital media (such as laptops, hard drives, and USB sticks) is the first step in a cyber forensic case. The acquisition should be conducted in such a way that all the pieces of evidence are reliable enough to be presented in court if necessary.

In this course, we cover every single step of a digital media acquisition, including not only the technical part but also the overall forensic methodology that should be followed.

First, you will be presented with some vital forensic concepts, such as chain of custody.
Next, you will explore all the pre-requisites before the data acquisition.
After, we show through demos how to image the most common digital media types using a professional forensic methodology.
Finally, you will discover how to organize all of the evidence and create work copies for the forensic investigators. All the forensic acquisition task follows strict processes and procedures that ensure that the data will not be tampered with and the evidence is reliable.

Throughout the course, you will follow a real-world scenario in which an employee was selling confidential information to competitors.

By the end of this course, you will be prepared and have the knowledge to be the forensic technician responsible for acquiring the data related to any case.

Course Outline

● Course Overview● Digital Media Acquisition Process● Preparing for the Data Acquisition● Arriving at the Site● Acquiring the Data● Organizing Evidence

Threats, Attacks and Vulnerabilities for CompTIA Security+


This course covers domain one of the CompTIA Security+ certification exam.
In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you'll learn about the various types of threats and attacks every company faces.
First, you'll learn the ins and outs of Malware, ransomware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. Next, you'll also learn the characteristics of the various types of threat actors, the skills they have, and the tools they use. Finally, you'll learn about penetration testing and vulnerability scanning and how they're used to help tighten security and mitigate potential breaches.
By the end of this course, you'll have a solid understanding of the various threats you're likely to face and what tools are available to mitigate these threats.

Course Outline

● Analyzing Indicators of Compromise & Determining Malware Types
● Comparing & Contrasting Attack Types
● Exploring Threat Actor Types and Attributes
● Defining the Penetration Testing Process
● Defining the Vulnerability Scanning Process
● Impacts Associated with Types of Vulnerabilities

Legal and Ethical Considerations for Digital Forensics


Digital forensics investigators are charged with analyzing technology such as computers, smartphones, tablets, and other everyday devices to determine if they have been used to commit a crime, abuse the resources of an organization, or harm other individuals.
In this course, Legal and Ethical Considerations for Digital Forensics, you’ll gain the ability to work with the various types of digital evidence and their admissibility in both a courtroom and a corporate setting.
First, you’ll explore investigator qualifications and ethical responsibilities in presenting evidence that may convict or exonerate a suspect. Next, you’ll discover the challenges of the international cybercrime law. Finally, you’ll learn how to perform an actual investigation in a corporate environment in a case study of corporate abuse.
When you’re finished with this course, you’ll have the skills and knowledge of digital forensics needed to determine the who, what, where, when, how, and why of a technology crime or incident.

Course Outline

● Course Overview
● Understanding Legal and Ethical Aspects of Digital Forensics
● Collecting and Handling Evidence
● Presenting Digital Evidence
● Navigating the US Legal System in Digital Forensics
● Understanding International Issues in Digital Forensics
● Case Study: Litigating a Digital Crime

Want to sign up for the course?

Complete the form to sign up on our website to start your educational journey.

Thank you!

We will contact you shortly.

Can't send form.

Please try again later.