-
Cybercrimes are on the rise, driving the demand for forensics specialists. This learning path will equip you with fundamental computer forensics knowledge and help you launch your career as a forensics expert.
- Learn how to collect and investigate network traffic.
- Discover how to recover evidence from an operating system.
- Develop your knowledge of languages such as Python.
-
Courses under this program:
Course 1: Learning Computer Forensics
-Learn how to acquire and analyze data from computers or storage devices with computer forensics.
Course 2: Operating System Forensics
-Learn the fundamentals of operating system forensics. Find out how to recover evidence from the operating system of any computer.
Course 3: Network Forensics
-Get a comprehensive, but succinct, look at network forensics. Learn how to prepare for network forensics investigations, investigate network events, and examine network traffic.
Course 4: Learning Linux Command Line
-Explore the Linux command line and Bash shell. Learn how to navigate the file and folder structure, edit text, set permissions, and install and update software on Linux machines.
Course 5: Wireshark: Malware and Forensics
-Learn to use Wireshark for deep packet analysis, capturing, and forensics. Learn to detect and handle unusual traffic on a network and prevent malicious activity.
Course 6: Protecting Your Network with Open Source Software
-Learn how to protect your network for free with open-source tools and these network-security tutorials from expert Jungwoo Ryoo.
Course 7: Learning PowerShell
-Learn how IT admins use PowerShell in their day-to-day work. Find out how to use cmdlets, work with functions, and use PowerShell in on-premises and cloud-based environments.
Course 8: Learning Bash Scripting
-Get a fast-paced introduction to Bash script, a popular shell scripting language.
Course 9: Python Essential Training
-Learn the skills to build a foundational knowledge of this popular programming language.
Course 10: Soft Skills for Information Security Professionals
-Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.