Digital Forensics Basics
0.0
(0)
Tier 1 Easy Skill Path Digital Forensics
This path covers everything from basic digital forensics concepts to Windows/Linux system analysis, memory forensics, and log analysis. You’ll directly handle forensic tools and techniques, building hands-on experience. By completing this path, you'll be able to collect and analyze digital evidence and track system breaches.
Digital Forensics Basics
0.0
(0)
Tier 1 Easy Skill Path Digital Forensics
This path covers everything from basic digital forensics concepts to Windows/Linux system analysis, memory forensics, and log analysis. You’ll directly handle forensic tools and techniques, building hands-on experience. By completing this path, you'll be able to collect and analyze digital evidence and track system breaches.
Retail Price
1100 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /43
43
Wargame 0 /17
17
Quiz 0 /7
7
You can access locked objectives by upgrading your plan or purchasing the units separately.

Why It's Worth Your Time

Digital forensics is the field dedicated to uncovering the truth behind cyber incidents like data breaches, malware infections, and insider threats by collecting and analyzing digital evidence. This path offers a step-by-step approach to real-world investigation techniques used in incident response, covering everything from evidence collection and system trace analysis to memory forensics. It is designed for beginners entering the world of digital forensics and is highly recommended for those interested in forensic investigation, cybercrime, incident response, or log analysis.

Topics Covered

  • Beginner-friendly digital forensics training combining theory and hands-on exercises
  • Techniques for acquiring and analyzing digital evidence using disk imaging, memory dumps, and hash functions
  • File system and artifact analysis on Windows and Linux
  • Deep dive into Windows registry, event logs, and browser artifacts
  • Linux incident response and log analysis techniques
  • Memory forensics for malware and user behavior analysis
  • How to use popular forensic tools like Autopsy and KAPE

Recommended For

  • Aspiring digital forensic investigators, cybercrime analysts, and incident responders
  • Those curious about digital traces left behind in systems
  • Beginners looking to get started in digital forensics

Prerequisite Knowledge

  • Basic understanding of Windows and Linux operating systems
  • Familiarity with file systems and memory structures
  • Experience with Python and Bash scripting
Unit Composition
Total 7 units
  1. 1
    9.8
    (20)
    Free
    9.8
    (20)
    Free
    Explore the key concepts of digital forensic science, and characteristics of digital data.
    Digital Forensics Basics
    Characteristics of digital data
    What is digital forensics?
    Quiz: Digital Forensics Basics
  2. 2
    10.0
    (7)
    150
    Coin
    Free with subscription
    10.0
    (7)
    150
    Coin
    Free with subscription
    Explore the methods for collection and analysis of digital data in digital forensics.
    Digital Evidence
    Disk imaging
    Memory Dump
    Hash Functions
    Quiz: Digital Evidence Collection
    Digital Data and Digital Devices
    Digital Data
    Digital Devices
    Quiz: Digital Data and Digital Devices
  3. 3
    8.5
    (2)
    100
    Coin
    Free with subscription
    8.5
    (2)
    100
    Coin
    Free with subscription
    Explore file system structures and their analysis methods in digital forensics perspective.
    File System
    File Systems
    FAT32 and NTFS File Systems
    [Exercise] VBR
    [Practice Together] VBR
    VBR
    [Exercise] Corrupted Disk Image
    [Practice Together] Corrupted Disk Image
    Corrupted Disk Image
  4. 4
    0.0
    (0)
    400
    Coin
    Free with subscription
    0.0
    (0)
    400
    Coin
    Free with subscription
    Explore Windows system forensics through the collection and analysis of Windows artifacts.
    Windows Artifacts
    Windows Artifacts
    Registry
    Registry
    [Exercise] Find the USB
    [Practice Together] Find the USB
    Find the USB
    [Exercise] Autoruns
    [Practice Together] Autoruns
    Autoruns
    System Logs
    $LogFile, $UsnJrnl
    [Exercise] Track_the_file
    [Practice Together] Track_the_file
    Track_the_file
    Event Logs
    Event log
    Quiz: Windows Artifacts Concepts
    [Exercise] boot_time
    [Practice Together] boot_time
    boot_time
    [Exercise] nikonikoni
    [Practice Together] nikonikoni
    nikonikoni
    Web Browser Artifacts
    Web Browser Artifacts
    [Exercise] chrome_artifacts
    [Practice Together] chrome_artifacts
    chrome_artifacts
    Application Execution Trails
    Prefetch and Cache
    [Exercise] study_checker
    [Practice Together] study_checker
    study_checker
    Deleted File Restoration
    Recycle Bin and File Recovery
    [Exercise] structure-based carving
    [Practice Together] structure-based carving
    structure-based carving
    Miscellaneous Windows Artifacts
    Summary of Windows Artifacts
    Quiz: Windows Artifacts
  5. 5
    0.0
    (0)
    200
    Coin
    Free with subscription
    0.0
    (0)
    200
    Coin
    Free with subscription
    Explore Linux system forensics techniques and incident response.
    Linux Forensics Overview
    Linux Forensics - Background
    System Logs Analysis
    System Information Collection
    System Log Analysis
    Quiz: Linux System Logs
    [Exercise] abcdefg-who
    [Practice Together] abcdefg-who
    abcdefg-who
    [Exercise] access-log
    [Practice Together] access-log
    access-log
    Linux Incident Response
    Investigating Attack Traces
    [Exercise] Quack
    [Practice Together] Quack
    Quack
    [Exercise] flask-forensics
    [Practice Together] flask-forensics
    flask-forensics
  6. 6
    0.0
    (0)
    150
    Coin
    Free with subscription
    0.0
    (0)
    150
    Coin
    Free with subscription
    Explore memory forensics using Volatility to analyze memory dumps and identify suspicious activities.
    Memory Forensics
    Memory Forensics Fundamentals
    User Behavior Identification
    Artifact Identification
    Quiz: Memory Forensics Basics
    [Exercise] find-the-spy
    [Practice Together] find-the-spy
    find-the-spy
    [Exercise] strange-program
    [Practice Together] strange-program
    strange-program
  7. 7
    10.0
    (1)
    100
    Coin
    Free with subscription
    10.0
    (1)
    100
    Coin
    Free with subscription
    Explore digital forensic tools, Autopsy and KAPE.
    Autopsy & KAPE
    Autopsy
    KAPE
    [Exercise] hacked
    [Practice Together] hacked
    hacked
Reviews
0.0 (0)
Retail Price
1100 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /43
43
Wargame 0 /17
17
Quiz 0 /7
7
You can access locked objectives by upgrading your plan or purchasing the units separately.