{"id":17618,"date":"2025-05-30T18:13:01","date_gmt":"2025-05-30T16:13:01","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=17618"},"modified":"2025-11-19T15:00:18","modified_gmt":"2025-11-19T14:00:18","slug":"ec-council-digital-forensics-essentials-dfe","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-digital-forensics-essentials-dfe\/","title":{"rendered":"EC-Council - Digital Forensics Essentials (D|FE)\u00a0\u00a0"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"17618\" class=\"elementor elementor-17618\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4fad91 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"1b4fad91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"793\" height=\"181\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview.png\" class=\"attachment-large size-large wp-image-12501\" alt=\"EC-Council Certified Acg CyberAcademy\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview.png 793w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview-300x68.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview-768x175.png 768w\" sizes=\"(max-width: 793px) 100vw, 793px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e4ef27 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"8e4ef27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"450\" height=\"366\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE_logo.jpg\" class=\"attachment-large size-large wp-image-17619\" alt=\"EC-Council \u2013 Digital Forensics Essentials (D|FE)\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE_logo.jpg 450w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE_logo-300x244.jpg 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE_logo-15x12.jpg 15w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25867c6 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"25867c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Digital Forensics Essentials<\/b> helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer. This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, Linux, Malware Forensics, and so much more! The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in digital forensics. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versusmachine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.<\/p><p><b>DFE<\/b>-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers.<br \/>This improves their prospects for employment advancement, higher salaries, and greater job satisfaction. If you are looking to learn advance in Digital Forensics click here: Digital Forensics Certification (Computer Hacking Forensics Investigator C|HFI)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdbcfe6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"fdbcfe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>School students, graduates, professionals, career starters and changers, IT \/ Technology \/ Cybersecurity teams with little or no work experience.<\/li><li>High school students who want to get an early start on their cybersecurity careers and master the fundamentals of security online.<\/li><li>College or university students interested in preparing for a cybersecurity career and aiding their IT education.<\/li><li>Working professionals who want to get into the cybersecurity field and don't know where to start their education journey.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9471f9 elementor-widget elementor-widget-spacer\" data-id=\"f9471f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7930b4 elementor-widget elementor-widget-heading\" data-id=\"f7930b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training Program\n\n\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6a7713 elementor-widget elementor-widget-n-accordion\" data-id=\"c6a7713\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2080\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2080\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 01: Computer Forensics Fundamentals <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2080\" class=\"elementor-element elementor-element-e234a0f e-con-full e-flex e-con e-child\" data-id=\"e234a0f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2080\" class=\"elementor-element elementor-element-a12471a e-flex e-con-boxed e-con e-child\" data-id=\"a12471a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e7203b elementor-widget elementor-widget-text-editor\" data-id=\"2e7203b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Fundamentals of Computer Forensics<\/li><li>Digital Evidence<\/li><li>Forensic Readiness<\/li><li>Roles and Responsibilities of a Forensic Investigator<\/li><li>Legal Compliance in Computer Forensics<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2081\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2081\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 02: Computer Forensics Investigation Process <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2081\" class=\"elementor-element elementor-element-98d1897 e-con-full e-flex e-con e-child\" data-id=\"98d1897\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2081\" class=\"elementor-element elementor-element-162eac6 e-flex e-con-boxed e-con e-child\" data-id=\"162eac6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-374aff4 elementor-widget elementor-widget-text-editor\" data-id=\"374aff4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Forensic Investigation Process and its Importance<\/li><li>Forensic Investigation Process - Pre-Investigation Phase<\/li><li>Forensic Investigation Process - Investigation Phase<\/li><li>Forensic Investigation Process - Post investigation Phase<\/li><\/ul><p>\u00a0<\/p><p><b>Labs<\/b><\/p><ul><li>Performing Hash or HMAC Calculations<\/li><li>Comparing Hash Values of Files to Check their Integrity<\/li><li>Viewing Files of Various Formats<\/li><li>Creating a Disk Image File of a Hard Disk Partition<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2082\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2082\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 03: Understanding Hard Disks and File Systems <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2082\" class=\"elementor-element elementor-element-f909310 e-con-full e-flex e-con e-child\" data-id=\"f909310\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2082\" class=\"elementor-element elementor-element-bbb3ef6 e-flex e-con-boxed e-con e-child\" data-id=\"bbb3ef6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86463c0 elementor-widget elementor-widget-text-editor\" data-id=\"86463c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Different Types of Disk Drives and their Characteristics<\/li><li>Logical Structure of a Disk<\/li><li>Booting Process of Windows, Linux, and Mac Operating Systems<\/li><li>File Systems of Windows, Linux, and Mac Operating Systems<\/li><li>File System Examination<\/li><\/ul><p>\u00a0<\/p><p><strong>Lab<\/strong><\/p><ul><li>Analyzing File System of a Linux Image<\/li><li>Recovering Deleted Files from Hard Disks<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2083\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2083\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 04: Data Acquisition and Duplication <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2083\" class=\"elementor-element elementor-element-5efb26b e-flex e-con-boxed e-con e-child\" data-id=\"5efb26b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2083\" class=\"elementor-element elementor-element-9a45960 e-con-full e-flex e-con e-child\" data-id=\"9a45960\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d68086d elementor-widget elementor-widget-text-editor\" data-id=\"d68086d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Data Acquisition Fundamentals<\/li><li>Types of Data Acquisition<\/li><li>Data Acquisition Format<\/li><li>Data Acquisition Methodology<\/li><\/ul><p>\u00a0<\/p><p><strong>Lab Exercise<\/strong><\/p><ul><li>Creating a dd Image of a System Drive<\/li><li>Converting Acquired Image File to a Bootable Virtual Machine<\/li><li>Acquiring RAM from Windows Workstations<\/li><li>Viewing Contents of Forensic Image File<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2084\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2084\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 05: Defeating Anti-forensics Techniques <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2084\" class=\"elementor-element elementor-element-474a25f e-flex e-con-boxed e-con e-child\" data-id=\"474a25f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2084\" class=\"elementor-element elementor-element-5ffb73b e-con-full e-flex e-con e-child\" data-id=\"5ffb73b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8749c31 elementor-widget elementor-widget-text-editor\" data-id=\"8749c31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Anti-Forensics and its Techniques<\/li><li>Anti-Forensics Countermeasures<\/li><\/ul><p>\u00a0<\/p><p><strong>Labs<\/strong><\/p><ul><li>SSD File Carving on a Windows File System<\/li><li>Recovering Data from Lost \/ Deleted Disk Partition<\/li><li>Cracking Application Passwords<\/li><li>Detecting Steganography<\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2085\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2085\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 06: Windows Forensics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2085\" class=\"elementor-element elementor-element-6578306 e-flex e-con-boxed e-con e-child\" data-id=\"6578306\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2085\" class=\"elementor-element elementor-element-7d8c414 e-con-full e-flex e-con e-child\" data-id=\"7d8c414\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27eba40 elementor-widget elementor-widget-text-editor\" data-id=\"27eba40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Volatile and Non-Volatile Information<\/li><li>Windows Memory and Registry Analysis<\/li><li>Cache, Cookie, and History Recorded in Web Browsers<\/li><li>Windows Files and Metadata<\/li><\/ul><p>\u00a0<\/p><p><strong>Labs<\/strong><\/p><ul><li>Acquiring Volatile Information from a Live Windows System<\/li><li>Investigating Forensic Image of Windows RAM<\/li><li>Examining Web Browser Artifacts<\/li><li>Extracting Information about Loaded Processes on a Computer<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2086\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2086\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 07: Linux and Mac Forensics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2086\" class=\"elementor-element elementor-element-ef7fb27 e-flex e-con-boxed e-con e-child\" data-id=\"ef7fb27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2086\" class=\"elementor-element elementor-element-eaf4077 e-con-full e-flex e-con e-child\" data-id=\"eaf4077\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd0b94c elementor-widget elementor-widget-text-editor\" data-id=\"fd0b94c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Volatile and Non-Volatile Data in Linux<\/li><li>Analyze Filesystem Images Using The Sleuth Kit<\/li><li>Memory Forensics<\/li><li>Mac Forensics<\/li><\/ul><p>\u00a0<\/p><p><strong>Labs<\/strong><\/p><ul><li>Forensic Investigation on a Linux Memory Dump<\/li><li>Recovering Data from a Linux Memory Dump<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2087\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2087\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 08: Network Forensics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2087\" class=\"elementor-element elementor-element-2eaeb3a e-flex e-con-boxed e-con e-child\" data-id=\"2eaeb3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2087\" class=\"elementor-element elementor-element-1da3ea3 e-con-full e-flex e-con e-child\" data-id=\"1da3ea3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c211c24 elementor-widget elementor-widget-text-editor\" data-id=\"c211c24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Network Forensics Fundamentals<\/li><li>Event Correlation Concepts and Types<\/li><li>Identify Indicators of Compromise (IoCs) from Network Logs<\/li><li>Investigate Network Traffic<\/li><\/ul><p>\u00a0<\/p><p><strong>Labs<\/strong><\/p><ul><li>Identifying and Investigating Various Network Attacks using Wireshark<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2088\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2088\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 09: Investigating Web Attacks <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2088\" class=\"elementor-element elementor-element-e3971c4 e-flex e-con-boxed e-con e-child\" data-id=\"e3971c4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2088\" class=\"elementor-element elementor-element-fcbaa51 e-con-full e-flex e-con e-child\" data-id=\"fcbaa51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cf24ae elementor-widget elementor-widget-text-editor\" data-id=\"3cf24ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Web Application Forensics<\/li><li>IIS and Apache Web Server Logs<\/li><li>Investigating Web Attacks on Windows-based Servers<\/li><li>Detect and Investigate Attacks on Web Applications<\/li><\/ul><p>\u00a0<\/p><p><strong>Labs<\/strong><\/p><ul><li>Identifying and Investigating Web Application Attacks Using Splunk<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2089\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"10\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2089\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 10: Dark Web Forensics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2089\" class=\"elementor-element elementor-element-95f9906 e-flex e-con-boxed e-con e-child\" data-id=\"95f9906\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2089\" class=\"elementor-element elementor-element-8ae7162 e-con-full e-flex e-con e-child\" data-id=\"8ae7162\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7cc0f9 elementor-widget elementor-widget-text-editor\" data-id=\"e7cc0f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Dark Web<\/li><li>Dark Web Forensics<\/li><li>Tor Browser Forensics<\/li><\/ul><p>\u00a0<\/p><p><strong>Labs<\/strong><\/p><ul><li>Detecting TOR Browser on a Machine<\/li><li>Analyzing RAM Dumps to Retrieve TOR Browser Artifacts<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-20810\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"11\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-20810\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 11: Investigating Email Crimes <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-20810\" class=\"elementor-element elementor-element-3686ba8 e-flex e-con-boxed e-con e-child\" data-id=\"3686ba8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-20810\" class=\"elementor-element elementor-element-6cf007d e-con-full e-flex e-con e-child\" data-id=\"6cf007d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2d6edb elementor-widget elementor-widget-text-editor\" data-id=\"d2d6edb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Email Basics<\/li><li>Email Crime Investigation and its Steps<\/li><\/ul><p>\u00a0<\/p><p><strong>Lab Exercise<\/strong><\/p><ul><li>Investigating a Suspicious Email<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-20811\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"12\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-20811\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 12: Malware Forensics <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-20811\" class=\"elementor-element elementor-element-681217b e-flex e-con-boxed e-con e-child\" data-id=\"681217b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-20811\" class=\"elementor-element elementor-element-f48da50 e-con-full e-flex e-con e-child\" data-id=\"f48da50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-646d246 elementor-widget elementor-widget-text-editor\" data-id=\"646d246\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Malware, its Components and Distribution Methods<\/li><li>Malware Forensics Fundamentals and Recognize Types of Malware Analysis<\/li><li>Static Malware Analysis<\/li><li>Analyze Suspicious Word Documents<\/li><li>Dynamic Malware Analysis<\/li><li>System Behavior Analysis<\/li><li>Network Behavior Analysis<\/li><\/ul><p>\u00a0<\/p><p><strong>Lab Exercise<\/strong><\/p><ul><li>Performing Static Analysis on a Suspicious File<\/li><li>Forensic Examination of a Suspicious Microsoft Office Document<\/li><li>Performing System Behaviour Analysis<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Digital Forensics Essentials (D|FE) course aims to enhance your competency and expertise in digital forensics and information security skills, offering 12 comprehensive modules, 11 hours of premium self-paced video training, courseware, and 11 labs<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Recommended<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>No prior cybersecurity knowledge or IT work experience required.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc7df0e e-flex e-con-boxed e-con e-parent\" data-id=\"dc7df0e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9ea21ca e-con-full e-flex e-con e-child\" data-id=\"9ea21ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-158a494 elementor-button-info elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"158a494\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE-Brochure-2.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View the brochure for this training<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-335432e e-con-full e-flex e-con e-child\" data-id=\"335432e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1aab613 elementor-button-info elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"1aab613\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/DFEv1-Course-Outline.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Explore the Course Outline<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Description Digital Forensics Essentials helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer. This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, Linux, Malware Forensics, and so [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":17620,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[],"examen":[146],"langue":[164],"niveau":[],"formateur":[176],"cpf":[],"organismes":[],"organisme":[],"mec_category":[78],"class_list":["post-17618","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","examen-oui","langue-anglais","formateur-ec-council","mec_category-cybersecurite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EC-Council \u2013 Digital Forensics Essentials (D|FE)\u00a0\u00a0 - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Gain hands-on digital forensics skills, master investigation processes, malware, Dark Web, and enhance your cybersecurity career\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-digital-forensics-essentials-dfe\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EC-Council \u2013 Digital Forensics Essentials (D|FE)\u00a0\u00a0 - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Gain hands-on digital forensics skills, master investigation processes, malware, Dark Web, and enhance your cybersecurity career\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-digital-forensics-essentials-dfe\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T14:00:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE-Product-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-digital-forensics-essentials-dfe\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-digital-forensics-essentials-dfe\\\/\",\"name\":\"EC-Council \u2013 Digital Forensics Essentials (D|FE)\u00a0\u00a0 - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-digital-forensics-essentials-dfe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-digital-forensics-essentials-dfe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/DFE-Product-Image.jpg\",\"datePublished\":\"2025-05-30T16:13:01+00:00\",\"dateModified\":\"2025-11-19T14:00:18+00:00\",\"description\":\"Gain hands-on digital forensics skills, master investigation processes, malware, Dark Web, and enhance your cybersecurity career\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-digital-forensics-essentials-dfe\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-digital-forensics-essentials-dfe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-digital-forensics-essentials-dfe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/DFE-Product-Image.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/DFE-Product-Image.jpg\",\"width\":500,\"height\":500,\"caption\":\"Gain hands-on digital forensics skills, master investigation processes, malware, Dark Web, and enhance your cybersecurity career\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-digital-forensics-essentials-dfe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"EC-Council \u2013 Digital Forensics Essentials (D|FE)\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EC-Council \u2013 Digital Forensics Essentials (D|FE)\u00a0\u00a0 - ACG CyberAcademy","description":"Gain hands-on digital forensics skills, master investigation processes, malware, Dark Web, and enhance your cybersecurity career","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-digital-forensics-essentials-dfe\/","og_locale":"en_GB","og_type":"article","og_title":"EC-Council \u2013 Digital Forensics Essentials (D|FE)\u00a0\u00a0 - ACG CyberAcademy","og_description":"Gain hands-on digital forensics skills, master investigation processes, malware, Dark Web, and enhance your cybersecurity career","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-digital-forensics-essentials-dfe\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-19T14:00:18+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE-Product-Image.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-digital-forensics-essentials-dfe\/","url":"https:\/\/acgcyberacademy.fr\/events\/ec-council-digital-forensics-essentials-dfe\/","name":"EC-Council \u2013 Digital Forensics Essentials (D|FE)\u00a0\u00a0 - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-digital-forensics-essentials-dfe\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-digital-forensics-essentials-dfe\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE-Product-Image.jpg","datePublished":"2025-05-30T16:13:01+00:00","dateModified":"2025-11-19T14:00:18+00:00","description":"Gain hands-on digital forensics skills, master investigation processes, malware, Dark Web, and enhance your cybersecurity career","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-digital-forensics-essentials-dfe\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/ec-council-digital-forensics-essentials-dfe\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-digital-forensics-essentials-dfe\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE-Product-Image.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/DFE-Product-Image.jpg","width":500,"height":500,"caption":"Gain hands-on digital forensics skills, master investigation processes, malware, Dark Web, and enhance your cybersecurity career"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-digital-forensics-essentials-dfe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"EC-Council \u2013 Digital Forensics Essentials (D|FE)\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=17618"}],"version-history":[{"count":29,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17618\/revisions"}],"predecessor-version":[{"id":21846,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17618\/revisions\/21846"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/17620"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=17618"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=17618"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=17618"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=17618"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=17618"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=17618"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=17618"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=17618"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=17618"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=17618"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=17618"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=17618"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=17618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}