Curriculum
- 11 Sections
- 63 Lessons
- 16 Weeks
Expand all sectionsCollapse all sections
- Module 1: Digital Forensics Profesasion and Investigations7
- Module 2: Data Acquisition10
- 2.1Storage Formats for Digital Evidence
- 2.2Determining the Best Acquisition Method
- 2.3Contingency Planning for Image Acquisitions
- 2.4Using Acquisition Tools
- 2.5Acquiring Data with a Linux Boot CD
- 2.6Validating Data Acquisitions
- 2.7Performing RAID Acquisitions
- 2.8Using Remote Network Acquisition Tools
- 2.9Using Other Forensics Acquisition Tools
- 2.10Create an Image with FTK Imager
- Module 3: Processing Crime and Incident Scenes9
- 3.1Identifying Digital Evidence
- 3.2Collecting Evidence in Private-Sector Incident Scenes
- 3.3Processing Law Enforcement Crime Scenes
- 3.4Preparing for a Search
- 3.5Securing a Digital Incident or Crime Scene
- 3.6Seizing Digital Evidence at the Scene
- 3.7Storing Digital Evidence
- 3.8Obtaining a Digital Hash
- 3.9Acquiring Evidence with OSForensics
- Module 4: Working with Windows and CLI Systems8
- Module 5: Digital Forensics Tools3
- Module 6: Linux and Macintosh File Systems3
- Module 7: Recovering Graphics Files5
- Module 8: Digital Forensics Analysis and Validation3
- Module 9: Virtual Machine Forensics, Live Acquisitions, Network Forensics, E-Mail, and Social Media Investigations9
- 9.1Virtual Machine Forensics
- 9.2Performing Live Acquisitions
- 9.3Network Forensics Overview
- 9.4Role of E-Mail in Investigations
- 9.5Roles of the Client and Server in E-Mail
- 9.6E-Mail Servers
- 9.7Using Specialised E-Mail Forensics Tools
- 9.8Applying Digital Forensics Methods to Social Media Communications
- 9.9Network Analysis Using Wireshark
- Module 10: Mobile Device Forensics and the Internet of Anything3
- Module 11: Report Writing for High-Tech Investigations3
Guidelines for Writing Reports
Prev