Digital Forensics

"Digital forensics isn't about looking at files — it's about listening to what the system is trying to say."


What is digital forensics ?

Digital forensics is a field of study where you learn to collect, analyze, preserve data even you can use that data as avidence if that is acceptable.

What is in this section ?

In this section you are going to learn about digital forensics and insident response in in-depth, with hands on practice on secure simulations.


Following DFIR structure we are going to follow

  1. 4 Topics

    1. Fundamentals of DFIR

    1. 1.1. Introduction to DFIR
    2. 1.2. Roles in DFIR
    3. 1.3. DFIR Methodologies
    4. 1.4. Digital Evidence Types
  2. 6 Topics

    2. Legal, Ethical, and Compliance Considerations

    1. 2.1. Chain of Custody Procedures
    2. 2.2. Evidence Integrity and Validation (Hashing: MD5/SHA1/SHA256)
    3. 2.3. Court-Admissible Evidence (Daubert Standard)
    4. 2.4. Jurisdictional Challenges
    5. 2.5. Regulatory Frameworks
    6. 2.6. Ethics in Forensics
  3. 6 Topics

    3. Disk and Storage Forensics

    1. 3.1. Disk Acquisition
    2. 3.2. Partition Schemes
    3. 3.3. File Systems
    4. 3.4. File Carving
    5. 3.5. Volume Shadow Copy Analysis
    6. 3.6. Encrypted Volumes
  4. 4 Topics

    4. Memory Forensics

    1. 4.1. RAM Acquisition
    2. 4.2. Analysis Frameworks
    3. 4.3. Artifacts in Memory
    4. 4.4. Malware Artifacts
  5. 3 Topics

    5. Operating System Artifact Analysis

    1. 5.1. Windows Forensics
    2. 5.2. Linux Forensics
    3. 5.3. macOS Forensics
  6. 4 Topics

    6. Mobile Device Forensics

    1. 6.1. Extraction Methods
    2. 6.2. Tools
    3. 6.3. App and OS Artifacts
    4. 6.4. Mobile Malware Analysis
  7. 5 Topics

    7. Network and Traffic Forensics

    1. 7.1. Network Capture Tools
    2. 7.2. Protocol Analysis
    3. 7.3. Packet Reconstruction
    4. 7.4. Logs
    5. 7.5. Wi-Fi Forensics
  8. 4 Topics

    8. Email and Web Forensics

    1. 8.1. Email Header Analysis
    2. 8.2. MIME Structure Parsing
    3. 8.3. Email Spoofing and Phishing
    4. 8.4. Web Browser Artifacts
  9. 3 Topics

    9. Malware Analysis & Reverse Engineering

    1. 9.1. Static Analysis
    2. 9.2. Dynamic Analysis
    3. 9.3. Reverse Engineering
  10. 3 Topics

    10. Incident Response

    1. 10.1. Lifecycle
    2. 10.2. Playbooks
    3. 10.3. IR Tools
  11. 4 Topics

    11. Cloud Forensics

    1. 11.1. AWS
    2. 11.2. Azure
    3. 11.3. GCP
    4. 11.4. SaaS Forensics (Google Workspace, O365)
  12. 6 Topics

    12. Anti-Forensics and Evasion Techniques

    1. 12.1. File Wiping Tools
    2. 12.2. Time Stomping
    3. 12.3. Steganography
    4. 12.4. Alternate Data Streams (ADS)
    5. 12.5. RAM Poisoning
    6. 12.6. Log Tampering
  13. 5 Topics

    13. Reporting, Documentation, and Courtroom Readiness

    1. 13.1. Report Writing Best Practices
    2. 13.2. Timeline Reconstruction
    3. 13.3. Screenshots, Tool Logs, and Hashes
    4. 13.4. Expert Testimony Preparation
    5. 13.5. Trial Presentation Tools
  14. 3 Topics

    14. Education, Certifications, and Labs

    1. 14.1. Certifications
    2. 14.2. DFIR Labs & Practice
    3. 14.3. Capture the Flag (CTFs) for DFIR

📞 Contact Us

We're always here to help!

© 2024 cyberuniversity.tech. All rights reserved.Term of service, Privacy Policy