Trending Course

Digital Forensics (Advanced)​

Master the techniques investigators use to uncover, recover, and analyse digital evidence — even when someone has tried hard to hide it.

Course Curriculum

What You'll Learn

Module 1 : Anti-Forensics and Evidence Recovery

  • Anti-forensics Techniques
  • Data Deletion and Recycle Bin Forensics
  • File Carving and Evidence Recovery from Deleted Partitions
  • Password Cracking and Bypassing Techniques
  • Steganography and Hidden Data Detection
  • Trail Obfuscation and File Extension Manipulation
  • Artifact Wiping and Overwritten Data Detection
  • Encryption in Digital Forensics
  • Program Packers and Footprint Minimization Techniques

Module 2 : Windows Forensics

  • Windows Forensics Fundamentals
  • Collecting Volatile Information
  • Collecting Non-volatile Information
  • Windows Memory Analysis
  • Windows Registry Analysis
  • Electron Application Analysis
  • Web Browser Forensics
  • Windows File and Metadata Analysis
  • ShellBags, LNK Files, and Jump Lists
  • Text Logs and Windows Event Logs

Module 3 : Linux and macOS Forensics

  • Volatile Data Collection in Linux
  • Non-volatile Data Collection in Linux
  • Linux Memory Forensics
  • Mac Forensics Fundamentals
  • Volatile Data Collection in Mac
  • Non-volatile Data Collection in Mac
  • Mac Memory Forensics and Tools

Module 4 : Network Forensics

  • Network Forensics Fundamentals
  • Event Correlation Concepts
  • Identifying Indicators of Compromise (IoCs) from Network Logs
  • Network Traffic Investigation
  • Incident Detection Using SIEM Tools
  • Wireless Network Forensics
  • Investigating Wireless Network Attacks

Module 5 : Malware Forensics

  • Malware Forensics Fundamentals
  • Static Malware Analysis
  • Suspicious Document Analysis
  • System Behavior Analysis
  • Network Behavior Analysis
  • Ransomware Analysis

Module 6 : Web Attack Investigation

  • Web Application Forensics
  • IIS Log Analysis
  • Apache Web Server Log Analysis
  • Investigating Web Application Attacks

Module 7 : Dark Web Investigation

  • Dark Web Concepts and Investigations
  • Identifying Tor Browser Traces
  • Tor Browser Forensics

Module 8 : Cloud Forensics

  • Cloud Forensics Fundamentals
  • AWS Fundamentals and Forensics
  • Microsoft Azure Fundamentals and Forensics
  • Google Cloud Fundamentals and Forensics

Module 9 : Mobile Forensics

  • Mobile Device Forensics Fundamentals
  • Android and iOS Architecture, Boot Process, and File Systems
  • Mobile Forensics Process
  • Cellular Network Data Investigation
  • File System Acquisition
  • Phone Locks, Rooting, and Jailbreaking
  • Logical Acquisition
  • Physical Acquisition
  • Android and iOS Forensic Analysis

Module 10 : IoT Forensics

  • IoT Device Forensics
Scroll to Top