Digital Forensics Basics
This path covers everything from basic digital forensics concepts to Windows/Linux system analysis, memory forensics, and log analysis. You’ll directly handle forensic tools and techniques, building hands-on experience. By completing this path, you'll be able to collect and analyze digital evidence and track system breaches.
Digital Forensics Basics
This path covers everything from basic digital forensics concepts to Windows/Linux system analysis, memory forensics, and log analysis. You’ll directly handle forensic tools and techniques, building hands-on experience. By completing this path, you'll be able to collect and analyze digital evidence and track system breaches.
Retail Price
1100 coins
When you subscribe
Free
0% Completed
Total 0 completed
Lecture
0 /43
43
Wargame
0 /17
17
Quiz
0 /7
7
Why It's Worth Your Time
Digital forensics is the field dedicated to uncovering the truth behind cyber incidents like data breaches, malware infections, and insider threats by collecting and analyzing digital evidence. This path offers a step-by-step approach to real-world investigation techniques used in incident response, covering everything from evidence collection and system trace analysis to memory forensics. It is designed for beginners entering the world of digital forensics and is highly recommended for those interested in forensic investigation, cybercrime, incident response, or log analysis.
Topics Covered
- Beginner-friendly digital forensics training combining theory and hands-on exercises
- Techniques for acquiring and analyzing digital evidence using disk imaging, memory dumps, and hash functions
- File system and artifact analysis on Windows and Linux
- Deep dive into Windows registry, event logs, and browser artifacts
- Linux incident response and log analysis techniques
- Memory forensics for malware and user behavior analysis
- How to use popular forensic tools like Autopsy and KAPE
Recommended For
- Aspiring digital forensic investigators, cybercrime analysts, and incident responders
- Those curious about digital traces left behind in systems
- Beginners looking to get started in digital forensics
Prerequisite Knowledge
- Basic understanding of Windows and Linux operating systems
- Familiarity with file systems and memory structures
- Experience with Python and Bash scripting
Unit Composition
- 1
- 2150Coin
Free with subscription
150CoinFree with subscription
Explore the methods for collection and analysis of digital data in digital forensics.Digital EvidenceDisk imagingMemory DumpHash FunctionsQuiz: Digital Evidence CollectionDigital Data and Digital DevicesDigital DataDigital DevicesQuiz: Digital Data and Digital Devices - 3100Coin
Free with subscription
100CoinFree with subscription
Explore file system structures and their analysis methods in digital forensics perspective.File SystemFile SystemsFAT32 and NTFS File Systems[Exercise] VBR[Practice Together] VBRVBR[Exercise] Corrupted Disk Image[Practice Together] Corrupted Disk ImageCorrupted Disk Image - 4400Coin
Free with subscription
400CoinFree with subscription
Explore Windows system forensics through the collection and analysis of Windows artifacts.Windows ArtifactsWindows ArtifactsRegistryRegistry[Exercise] Find the USB[Practice Together] Find the USBFind the USB[Exercise] Autoruns[Practice Together] AutorunsAutorunsSystem Logs$LogFile, $UsnJrnl[Exercise] Track_the_file[Practice Together] Track_the_fileTrack_the_fileEvent LogsEvent logQuiz: Windows Artifacts Concepts[Exercise] boot_time[Practice Together] boot_timeboot_time[Exercise] nikonikoni[Practice Together] nikonikoninikonikoniWeb Browser ArtifactsWeb Browser Artifacts[Exercise] chrome_artifacts[Practice Together] chrome_artifactschrome_artifactsApplication Execution TrailsPrefetch and Cache[Exercise] study_checker[Practice Together] study_checkerstudy_checkerDeleted File RestorationRecycle Bin and File Recovery[Exercise] structure-based carving[Practice Together] structure-based carvingstructure-based carvingMiscellaneous Windows ArtifactsSummary of Windows ArtifactsQuiz: Windows Artifacts - 5200Coin
Free with subscription
200CoinFree with subscription
Explore Linux system forensics techniques and incident response.Linux Forensics OverviewLinux Forensics - BackgroundSystem Logs AnalysisSystem Information CollectionSystem Log AnalysisQuiz: Linux System Logs[Exercise] abcdefg-who[Practice Together] abcdefg-whoabcdefg-who[Exercise] access-log[Practice Together] access-logaccess-logLinux Incident ResponseInvestigating Attack Traces[Exercise] Quack[Practice Together] QuackQuack[Exercise] flask-forensics[Practice Together] flask-forensicsflask-forensics - 6150Coin
Free with subscription
150CoinFree with subscription
Explore memory forensics using Volatility to analyze memory dumps and identify suspicious activities.Memory ForensicsMemory Forensics FundamentalsUser Behavior IdentificationArtifact IdentificationQuiz: Memory Forensics Basics[Exercise] find-the-spy[Practice Together] find-the-spyfind-the-spy[Exercise] strange-program[Practice Together] strange-programstrange-program - 7
Reviews
Retail Price
1100 coins
When you subscribe
Free
0% Completed
Total 0 completed
Lecture
0 /43
43
Wargame
0 /17
17
Quiz
0 /7
7