Digital FORENSICS
COURSE

Relevance

Digital forensics plays an important role in cybersecurity sphere. A huge amount of crimes is committed with the help of IT technologies. In 2021 cyber attacks costs global economy 650 billion $. Without forensics skills it takes so much more effort to deal with cybercrime.

This course is a digital forensics navigator for IT specialists, who want to gain or level up their skills in OSINT, collecting and analyzing artifacts in various types of memory and cryptography.

COURSE MODULES

Introduction to Digital Forensics
The main stages of the expertise.
Data collecting
Data collecting from digital media.
RAM analysis (with the help of Volatility Framework)
The main stages of the expertise.
Memory forensics
Research information after receiving a copy of the hard drive. Search for installed programs
Network traffic analysis
Analysis structure. Network protocols, levels of OSI model.
Steganography and cryptography
Methods of hiding information inside a picture. Tools of steganography detection. Encryption standards of AES and RSA.
OSINT
OSINT Framework. Shodan. Google Dorks, WhoIs.
Practical research
Production expertise.
Introduction to Digital Forensics
The main stages of the expertise.
Data collecting
Data collecting from digital media.
RAM analysis (with the help of Volatility Framework)
The main stages of the expertise.
Memory forensics
Research information after receiving a copy of the hard drive. Search for installed programs
Network traffic analysis
Analysis structure. Network protocols, levels of OSI model.
Steganography and cryptography
Methods of hiding information inside a picture. Tools of steganography detection. Encryption standards of AES and RSA.
OSINT
OSINT Framework. Shodan. Google Dorks, WhoIs.
Practical research
Production expertise.

WHO IS THIS DIGITAL FORENSICS
COURSE FOR?

CYBERSECURITY
SPECIALISTS.
MEMBERS OF INFORMATION-ANALYTICAL DEPARTMENT.
FORENSIC FIELD OFFICERS.

WHAT DO YOU NEED START

BASIC KNOWLEDGE OF IP NETWORKS

THE TCP/IP PROTOCOL STACK SERVICES

EXPERIENCE WITH OPERATING SYSTEMS

WINDOWS
LINUX

WHAT YOU’ LL BE ABLE TO DO
AFTER THE COURSE

MAKE AN INDEPENDENT COMPUTER FORENSIC ANALYSIS
APPEAR AS AN EXPERT IN COURT
PREPARE A REPORT ON CYBER FORENSICS
RESEARCH NETWORK TRAFFIC
MAKE AN INDEPENDENT COMPUTER FORENSIC ANALYSIS
APPEAR AS AN EXPERT IN COURT
PREPARE A REPORT ON CYBER FORENSICS
RESEARCH NETWORK TRAFFIC

Certificate preview

Price

Price on services is calculated individually to each project. For calculations contact CSF office.

Invalid E-mail