Cybersecurity Forensic and Mobility Training with Austin Briggs
MEET THE INSTRUCTOR AND FORENSIC ANALYST .......AUSTIN BRIGGS
About this course
Digital forensics involves the investigation of
computer-related crimes with the goal of obtaining evidence to be
presented in a court of law.
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.
This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.
In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.
This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.
What you'll learn
- Court admissibility investigative procedures
- Attributes of various Windows and Unix/Linux file systems and file recovery processes
- To identify and apply appropriate forensics tools to acquire, preserve and analyze system image
- Review and critique a forensics report
Course Syllabus
Skip Syllabus Description Week 1: Digital Forensics Fundamentals- Introduction to Incident response
- digital forensics four-step procedure
- Concepts: computer/network/Internet forensic and anti-forensics
- Unix/Linux incident response tools
- Unix/Linux file systems (Ext2/Ext3)
- Unix/Linux forensics investigation steps and technologies
- Unix/Linux forensics case studies
- Memory forensics
- Windows incident response tools
- Windows file systems
- Windows forensics tools
- Windows acquisition
- Windows forensics analysis – registry and other artifacts
- Loadable kernel module rootkits
- Steganography hiding, detection and analysis
Thanks for sharing helpful information on incident response. It is always beneficial to have good incident response tools. Thanks
ReplyDelete