Trending Course
Digital Forensics (Advanced)
Master the techniques investigators use to uncover, recover, and analyse digital evidence — even when someone has tried hard to hide it.
Course Curriculum
What You'll Learn
Module 1 : Anti-Forensics and Evidence Recovery
- Anti-forensics Techniques
- Data Deletion and Recycle Bin Forensics
- File Carving and Evidence Recovery from Deleted Partitions
- Password Cracking and Bypassing Techniques
- Steganography and Hidden Data Detection
- Trail Obfuscation and File Extension Manipulation
- Artifact Wiping and Overwritten Data Detection
- Encryption in Digital Forensics
- Program Packers and Footprint Minimization Techniques
Module 2 : Windows Forensics
- Windows Forensics Fundamentals
- Collecting Volatile Information
- Collecting Non-volatile Information
- Windows Memory Analysis
- Windows Registry Analysis
- Electron Application Analysis
- Web Browser Forensics
- Windows File and Metadata Analysis
- ShellBags, LNK Files, and Jump Lists
- Text Logs and Windows Event Logs
Module 3 : Linux and macOS Forensics
- Volatile Data Collection in Linux
- Non-volatile Data Collection in Linux
- Linux Memory Forensics
- Mac Forensics Fundamentals
- Volatile Data Collection in Mac
- Non-volatile Data Collection in Mac
- Mac Memory Forensics and Tools
Module 4 : Network Forensics
- Network Forensics Fundamentals
- Event Correlation Concepts
- Identifying Indicators of Compromise (IoCs) from Network Logs
- Network Traffic Investigation
- Incident Detection Using SIEM Tools
- Wireless Network Forensics
- Investigating Wireless Network Attacks
Module 5 : Malware Forensics
- Malware Forensics Fundamentals
- Static Malware Analysis
- Suspicious Document Analysis
- System Behavior Analysis
- Network Behavior Analysis
- Ransomware Analysis
Module 6 : Web Attack Investigation
- Web Application Forensics
- IIS Log Analysis
- Apache Web Server Log Analysis
- Investigating Web Application Attacks
Module 7 : Dark Web Investigation
- Dark Web Concepts and Investigations
- Identifying Tor Browser Traces
- Tor Browser Forensics
Module 8 : Cloud Forensics
- Cloud Forensics Fundamentals
- AWS Fundamentals and Forensics
- Microsoft Azure Fundamentals and Forensics
- Google Cloud Fundamentals and Forensics
Module 9 : Mobile Forensics
- Mobile Device Forensics Fundamentals
- Android and iOS Architecture, Boot Process, and File Systems
- Mobile Forensics Process
- Cellular Network Data Investigation
- File System Acquisition
- Phone Locks, Rooting, and Jailbreaking
- Logical Acquisition
- Physical Acquisition
- Android and iOS Forensic Analysis
Module 10 : IoT Forensics
- IoT Device Forensics

