Digital Forensics Professional: The World's Premier Online Digital Forensics Course
Digital Forensics Professional: The World's Premier Online Digital Forensics Course
Digital Forensics Professional: The World's Premier Online Digital Forensics Course
eLearnSecurity has been chosen by students in over 140 countries in the world
and by leading organizations such as:
INTRODUCTION
Regardless of which blue-team role you possess, having the ability to conduct digital
forensics investigations will make you an all-around and valuable blue-team
member. As an incident responder or threat hunter, you could still benefit from
having digital forensics skills, as such skills will enable you to identify and gather
digital evidence as well as retrieve and analyze data from both the wire and
endpoints.
PRE-REQUISITES
The DFP training course covers foundational topics on Digital Forensics; however, a
good working knowledge coupled with experience in information technology, with a
focus on information security, prior to the class will be needed to aid you in your
learning. You should have:
A solid understanding of the fundamentals of modern Operating Systems
Basic understanding of Networks, Network Protocols, and Programming
Languages
As a seasoned red-team member, you could also benefit from this course, since
knowing what digital evidence each attack leaves behind is crucial in updating your
current techniques, tactics, and procedures.
By design, the Digital Forensics Professional (DFP) course is the definitive online and
hands-on course if your goal is to become a digital investigator, as it will provide you
not only with the fundamentals of Digital Forensics but with practical investigation
skills as well.
COURSE ORGANIZATION
This training course is completely self-paced with interactive slides and video
material that students can access online without any limitation. Students have
lifetime access to the training material.
Students can study from home, the office or anywhere an internet connection is
available. Some course versions allow a student to download course material and
study offline.
While studying online, it is always possible to resume your studying from the last slide
or video accessed.
The Digital Forensics Professional course is also integrated with Hera Lab, the most
sophisticated virtual lab in IT Security. Hera Lab provides real-world IT Security
scenarios on demand where a student can practice each topic seen in the course in a
dedicated and isolated environment.
ORGANIZATION OF CONTENTS
The world of Digital Forensics is extensive, with many fields in forensic analysis. The
student is provided with a suggested learning path to ensure both maximum success
rate and minimum effort.
2. Data Acquisition
2.1. Introduction
2.1.1. Order of Volatility
2.1.2. Types of Data Acquisition
4. Disks
4.1. Introduction
4.2. Hard Disk Drives
4.2.1. Interface Types
4.2.2. BIOS
4.2.3. Solid State Drives
4.2.4. Hard Disk Drives
4.3. Volumes & Partitions
4.4. Disk Partitioning
4.4.1. MBR Partitioning
4.4.2. Disk Partitioning – Jumpers
4.4.3. GPT Partitioning and UEFI
4.4.4. Hidden Protected Area (HPA)
4.5. Tools
4.5.1. WinHex
4.5.2. Active@Disk
4.5.3. HxD
5. File Systems
5.1. Introduction
5.2. FAT File System Analysis
5.2.1. FAT Structures
5.2.1.1. Boot Sector
Course Home Page: www.elearnsecurity.com/dfp
SYSTEM & NETWORK FORENSICS
6. Windows Forensics
6.1. Introduction
6.2. User and System Artifacts
7. Network Forensics
7.1. Introduction
7.2. TCP/IP Protocol Suite
7.3. Classes of Traffic
7.4. Network Devices
7.5. Network Protocols
7.5.1. HTTP
7.5.2. Cryptography and SSL/TLS
7.5.3. SMTP
7.5.4. DNS
7.5.5. DHCP
7.5.6. ICMP
7.5.7. ARP
7.6. Network Forensics
7.6.1. Protocol Analysis
7.6.2. Flow Analysis
7.6.3. File Carving & Data Extraction
7.6.4. Statistical Flow Analysis
7.6.5. Network Forensics
7.7. Email Forensics
7.8. OSCAR
7.9. Network Evidence Acquisition
Course Home Page: www.elearnsecurity.com/dfp
LOGS, TIMELINE & REPORTING
9. Timeline Analysis
9.1. Introduction
9.2. Event Types
9.3. Approaches
9.4. Temporal Proximity
9.5. Timestamp Types
9.6. Timeline Fields
9.7. Creating Timelines
10. Reporting
10.1. Introduction
10.2. Tips on Reporting
10.3. How to Write a Report
10.4. Report Structure
10.5. What is a Good Report?
10.6. Report Samples
Based in Santa Clara, California and with offices in Pisa, Italy, and Dubai, UAE,
Caendra Inc. is a trusted source of IT security skills for IT professionals and
corporations of all sizes. Caendra Inc. is the Silicon Valley-based company behind the
eLearnSecurity brand.
Contact details:
www.elearnsecurity.com
contactus@elearnsecurity.com