Digital Forensics

Go to class
Write Review

Free Online Course: Digital Forensics provided by Swayam is a comprehensive online course, which lasts for 12 weeks long. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from Swayam. Digital Forensics is taught by Dr. Jeetendra Pande.

Overview
  • Computer forensics, or digital forensics, is a fairly new field. Computer forensics investigators, also known as computer forensics specialists, computer forensics examiners, or computer forensics analysts, are charged with uncovering and describing the information contained on, or the state or existence of, a digital artifact. Digital artifacts include computer systems, hard drives, CDs, and other storage devices, as well as electronic documents and files like emails and JPEG images. The fast-growing field of computer forensics includes several branches related to firewalls, networks, databases, and mobile devices. Digital forensics technicians can find work with many types of organizations: government (local, state, and federal), accounting firms, law firms, banks, and software development companies. Essentially, any kind of organization that has a computer system may have a need for a digital forensics specialist. Some digital forensics specialists opt to start their own businesses, giving them an opportunity to work with a variety of clients. Computer forensics investigators provide many services based on gathering digital information, from investigating computer systems and data in order to present information for legal cases to determining how an unauthorized user hacked into a system. A digital forensics examiner does many things in the course of these tasks – protects the computer system, recovers files (including those that were deleted or encrypted), analyses data found on various disks, and provides reports, feedback, and even testimony when required. The employment outlook for digital forensics examiners and investigators is favorable due to the rapid growth of crimes involving computers (cybercrime). Learning Outcomes After the successful completion of this course, the learner will be able to: A. Understand the importance of a systematic procedure for investigation of data found on digital storage media that might provide evidence of wrong-doing. B. Understand the file system storage mechanisms of the operating systems. C. Use tools for faithful preservation of data on disks for analysis. D. Find data that may be clear or hidden on a computer disk. E. Learn the use of computer forensics tools used in data analysis, such as searching, absolute disk sector viewing and editing, recovery of files, password cracking, etc. F. Understand how to present the results of disk data analysis in a court proceeding as an expert witness.

Syllabus
  • WEEK

    TOPIC

    MODULE




    Week 1




    Introduction to Digital Forensic

    Definition of Computer Forensics

    Cyber Crime

    Evolution of Computer Forensics

    Objectives of Computer Forensics

    Roles of Forensics Investigator

    Forensics Readiness

    Steps for Forensics



    Week 2



    Computer Forensics Investigation Process

    Digital Forensics Investigation Process

    Digital Forensics Investigation Process-Assessment Phase

    Acquire the Data

    Analyze the Data

    Report the Investigation


    Week 3


    Digital Evidence and First Responder Procedure

    Digital Evidence

    Digital Evidence Investigation Process

    First Responders Toolkit

    Issues Facing Computer Forensics

    Types of Investigation

    Techniques in digital forensics



    Week 4



    Understanding Storage Media and File System

    The Booting Process

    LINUX Boot Process

    Mac OS Boot Sequence

    Windows 10 Booting Sequence

    File System

    Type of File Systems






    Week 5






    Windows Forensics

    Introduction to Windows Forensics

    Windows Forensics Volatile Information

    Windows Forensics Non- Volatile Information

    Recovering deleted files and partitions

    Windows Forensics Summary

    Digital Forensics Road map: Static Data Acquisition from windows using FTK Imager

    Live Data Acquisition using FTK Imager

    FTK Imager

    Installation of KALI Linux

    RAM Dump Analysis using Volatility

    Static Data Acquisition from Linux OS



    Week 6



    Recovering Deleted Files and Partitions

    Digital Forensics Tools

    Overview of EnCase Forensics

    Deep Information Gathering Tool: Dmitry Page

    Computer Forensics Live Practical by using Autopsy and FTK Imager






    Week 7






    Network Forensics

    Introduction to Network Forensics

    Network Components and their forensic importance

    OSI internet Layers and their Forensic importance

    Tools Introduction Wireshark and TCPDUMP

    Packet Sniffing and Analysis using Ettercap and Wireshark

    Network Forensics

    Wireshark Packet Analyzer

    Packet Capture using TCP DUMP

    Website Penetration: WHOIS, nslookup




    Week 8




    Logs & Event Analysis

    Forensic Analysis using AUTOPSY: Linux and Windows

    Forensics and Log analysis

    Compare and AUDIT Evidences using Hashdeep Page

    Data Carving using Bulk Extractor: Kali Linux and Windows

    Recovering Evidence from Forensic Images using Foremost



    Week 9



    Application Password Cracking

    Introduction to Password Cracking

    Password Cracking using John the Ripper

    Password Cracking using Rainbow Tables

    PDF File Analysis

    Remote Imaging using E3 Digital Forensics






    Week 10






    Wireless and Web Attacks

    WiFi Packet Capture and Password Cracking using Aircrack ng

    Introduction to Web Attacks

    Website Copier: HTTRACK

    SQL Injection

    Site Report Generation: Netcraft

    Vulnerability Analysis: Nikto

    Wayback Machine

    Deep Information Gathering Tool: Dmitry

    Image Metadata Extraction using Imago

    Week 11

    Email Forensics Investigation

    Email Forensics Investigations



    Week 12


    Mobile Device Forensics

    Mobile Forensics

    Preparation for Digital Forensic investigation

    Investigative reports, expert witness and cyber regulations

    Introduction to Report Writing

    Forensic Reports & Expert Witness

    Demonstration of Some Forensics Tools

    Demonstration of Some Forensics Tools