Computer Forensics
Offered By: Rochester Institute of Technology via edX
Course Description
Overview
Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.
This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.
Syllabus
Week 1: Digital Forensics Fundamentals Introduction to Incident response digital forensics four-step procedure Concepts: computer/network/Internet forensic and anti-forensics
Week 2: Unix/Linux fundamentals Unix/Linux incident response tools Unix/Linux file systems (Ext2/Ext3)
Week 3: Unix/Linux Forensic Investigation Unix/Linux forensics investigation steps and technologies Unix/Linux forensics case studies
Week 4: Windows Incident Response Memory forensics Windows incident response tools
Week 5: Windows fundamentals Windows file systems Windows forensics tools
Week 6: Windows Forensic Investigation Windows acquisition Windows forensics analysis – registry and other artifacts
Week 7: Advanced artifacts Loadable kernel module rootkits Steganography hiding, detection and analysis
Week 8: Review and Everything Together
Taught by
Yin Pan
Tags
Related Courses
Probabilistic Graphical Models 1: RepresentationStanford University via Coursera Computer Security
Stanford University via Coursera Intro to Computer Science
University of Virginia via Udacity Introduction to Logic
Stanford University via Coursera Internet History, Technology, and Security
University of Michigan via Coursera