Leader dans le secteur des formations en cybersécurité.

EC-Council – Digital Forensics Essentials (D|FE)  

Catégorie
Taux satisfaction
4.8
Taux de réussite
4.9

Description

Digital Forensics Essentials helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer. This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, Linux, Malware Forensics, and so much more! The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in  digital forensics. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versusmachine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.

DFE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers.
This improves their prospects for employment advancement, higher salaries, and greater job satisfaction. If you are looking to learn advance in Digital Forensics click here: Digital Forensics Certification (Computer Hacking Forensics Investigator C|HFI)

Target group

  • School students, graduates, professionals, career starters and changers, IT / Technology / Cybersecurity teams with little or no work experience.
  • High school students who want to get an early start on their cybersecurity careers and master the fundamentals of security online.
  • College or university students interested in preparing for a cybersecurity career and aiding their IT education.
  • Working professionals who want to get into the cybersecurity field and don’t know where to start their education journey.

Training Program

Module 01 : Computer Forensics Fundamentals
  • Fundamentals of Computer Forensics
  • Digital Evidence
  • Forensic Readiness
  • Roles and Responsibilities of a Forensic Investigator
  • Legal Compliance in Computer Forensics
  • Forensic Investigation Process and its Importance
  • Forensic Investigation Process – Pre-Investigation Phase
  • Forensic Investigation Process – Investigation Phase
  • Forensic Investigation Process – Post investigation Phase

 

Labs

  • Performing Hash or HMAC Calculations
  • Comparing Hash Values of Files to Check their Integrity
  • Viewing Files of Various Formats
  • Creating a Disk Image File of a Hard Disk Partition
  • Different Types of Disk Drives and their Characteristics
  • Logical Structure of a Disk
  • Booting Process of Windows, Linux, and Mac Operating Systems
  • File Systems of Windows, Linux, and Mac Operating Systems
  • File System Examination

 

Lab

  • Analyzing File System of a Linux Image
  • Recovering Deleted Files from Hard Disks
  • Data Acquisition Fundamentals
  • Types of Data Acquisition
  • Data Acquisition Format
  • Data Acquisition Methodology

 

Lab Exercise

  • Creating a dd Image of a System Drive
  • Converting Acquired Image File to a Bootable Virtual Machine
  • Acquiring RAM from Windows Workstations
  • Viewing Contents of Forensic Image File
  • Anti-Forensics and its Techniques
  • Anti-Forensics Countermeasures

 

Labs

  • SSD File Carving on a Windows File System
  • Recovering Data from Lost / Deleted Disk Partition
  • Cracking Application Passwords
  • Detecting Steganography

 

  • Volatile and Non-Volatile Information
  • Windows Memory and Registry Analysis
  • Cache, Cookie, and History Recorded in Web Browsers
  • Windows Files and Metadata

 

Labs

  • Acquiring Volatile Information from a Live Windows System
  • Investigating Forensic Image of Windows RAM
  • Examining Web Browser Artifacts
  • Extracting Information about Loaded Processes on a Computer
  • Volatile and Non-Volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Memory Forensics
  • Mac Forensics

 

Labs

  • Forensic Investigation on a Linux Memory Dump
  • Recovering Data from a Linux Memory Dump
  • Network Forensics Fundamentals
  • Event Correlation Concepts and Types
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic

 

Labs

  • Identifying and Investigating Various Network Attacks using Wireshark
  • Web Application Forensics
  • IIS and Apache Web Server Logs
  • Investigating Web Attacks on Windows-based Servers
  • Detect and Investigate Attacks on Web Applications

 

Labs

  • Identifying and Investigating Web Application Attacks Using Splunk
  • Dark Web
  • Dark Web Forensics
  • Tor Browser Forensics

 

Labs

  • Detecting TOR Browser on a Machine
  • Analyzing RAM Dumps to Retrieve TOR Browser Artifacts
  • Email Basics
  • Email Crime Investigation and its Steps

 

Lab Exercise

  • Investigating a Suspicious Email
  • Malware, its Components and Distribution Methods
  • Malware Forensics Fundamentals and Recognize Types of Malware Analysis
  • Static Malware Analysis
  • Analyze Suspicious Word Documents
  • Dynamic Malware Analysis
  • System Behavior Analysis
  • Network Behavior Analysis

 

Lab Exercise

  • Performing Static Analysis on a Suspicious File
  • Forensic Examination of a Suspicious Microsoft Office Document
  • Performing System Behaviour Analysis

Goal

The Digital Forensics Essentials (D|FE) course aims to enhance your competency and expertise in digital forensics and information security skills, offering 12 comprehensive modules, 11 hours of premium self-paced video training, courseware, and 11 labs

Recommended

  • No prior cybersecurity knowledge or IT work experience required.
Réservez maintenant

Information importante :

Nos formations ne sont pas inscrites au Répertoire National des Certifications Professionnelles (RNCP), mais elles sont conformes aux exigences du Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

Nous utilisons des cookies pour améliorer votre expérience. Consultez notre Politique de cookies et notre Politique de confidentialité.

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.