Digital Forensics Essentials helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer.
提供:
このコースについて
貴社では、従業員に需要のあるスキルを訓練させることによって利益を得ることができるでしょうか?
Coursera for Businessを試す学習内容
Network forensics fundamentals, event correlation, and network traffic investigation
Data acquisition concepts, types, format, and methodology
Computer forensics investigation process and its phases
Fundamental concepts of computer forensics
習得するスキル
- Digital Forensics
- Computer Forensics
貴社では、従業員に需要のあるスキルを訓練させることによって利益を得ることができるでしょうか?
Coursera for Businessを試す提供:

EC-カウンシル
Best known for the Certified Ethical Hacker program, EC-Council builds individual and team/organization cyber capabilities through the Certified Ethical Hacker Program and other programs including Certified Secure Computer User, Computer Hacking Forensic Investigator, Certified Security Analyst, Certified Network Defender, Certified SOC Analyst, Certified Threat Intelligence Analyst, Certified Incident Handler, as well as the Certified Chief Information Security Officer.
シラバス - 本コースの学習内容
Module 01: Computer Forensics Fundamentals
Computer forensics plays a vital role in the investigation and prosecution of cybercriminals. The process includes the acquisition, inspection, and reporting of information stored across computers and networks in relation to a civil or criminal incident. Forensic investigators are trained professionals who extract, analyze/investigate, and report crimes that either target technology or use it as a tool to commit a crime. This module discusses the role of computer forensics in today’s world.
Module 02: Computer Forensics Investigation Process
One of the goals of performing a forensic investigation process is to have a better understanding of an incident by identifying and analyzing the evidence thereof. This module describes the different stages involved in the complete computer forensic investigation process and highlights the role of expert witnesses in solving a cybercrime case. It also outlines the importance of formal investigation reports presented in a court of law during a trial.
Module 03: Understanding Hard Disks and File Systems
Storage devices such as Hard Disk Drives (HDDs) and Solid-State Drives (SSDs) are an important source of information during forensic investigation. The investigator should locate and protect the data collected from storage devices as evidence. Therefore, it is necessary for the investigator to have knowledge on the structure and behavior of storage devices. The file system is also important as the storage and distribution of the data in a device is dependent on the file system used. This module provides insight into hard disks and file systems.
Module 04: Data Acquisition and Duplication
Data acquisition is the first proactive step in the forensic investigation process. Forensic data acquisition does not merely entail the copying of files from one device to another. Through forensic data acquisition, investigators aim to extract every bit of information present in the victim system’s memory and storage, in order to create a forensic copy of this information. Further, this forensic copy must be created in a manner such that integrity of the data is
verifiably preserved and can be used as evidence in the court. This module discusses the fundamental concepts of data acquisition and the various steps involved in the data acquisition methodology.
Module 05: Defeating Anti-forensics Techniques
After compromising a system, attackers often try to destroy or hide all traces of their activities; this makes forensic investigation extremely challenging for investigators. The use of various techniques by cyber-criminals to destroy or hide traces of illegal activities and hinder forensic investigation processes are referred to as anti-forensics. Forensic investigators need to overcome/defeat anti-forensics so that an investigation yields concrete and accurate evidence that helps identify and prosecute the perpetrators. This module outlines the fundamentals of anti-forensics techniques and elaborately discusses how forensic investigators can defeat them using various tools.
Module 06: Windows Forensics
Windows forensics refers to investigation of cyber-crimes involving Windows machines. It involves gathering of evidence from a Windows machine so that the perpetrator(s) of a cybercrime can be identified and prosecuted. Windows is one of the most widely used OSes; therefore, the possibility of a Windows machine being involved in an incident is high. So, investigators must have a thorough understanding of the various components of a Windows OS such as the file system, registries, system files, and event logs where they can find data of evidentiary value. This module discusses how to collect and examine forensic evidence related to incidents of cybercrime
on Windows machines.
Module 07: Linux and Mac Forensics
Windows may be the most commonly used platform for forensic analysis owing to its popularity in enterprise systems. Several digital forensics tools exist for systems operating on Windows. However, when it comes to conducting forensics investigation on Linux and Mac systems, investigators are faced with a different kind of challenge. While the forensics techniques are the same, the tools used might differ. This module discusses how to collect and examine evidence related to incidents of cybercrime on Linux and MacOS–based machines.
Module 08: Network Forensics
Network forensic investigation refers to the analysis of network security events (which include network attacks and other undesirable events that undermine the security of the network) for two broad purposes — to determine the causes of the network security events so that appropriate safeguards and countermeasures can be adopted, and to gather evidence against the perpetrators of the attack for presentation in the court of law. This module discusses the methods of investigating network traffic to locate suspicious packets and identify indicators of compromise (IoCs) from the analysis of various log files.
Module 09: Investigating Web Attacks
Web applications allow users to access their resources through client-side programs such as web browsers. Some web applications may contain vulnerabilities that allow cyber criminals to launch application-specific attacks such as SQL Injection, cross site scripting, local file inclusion (LFI), command injection, etc., which cause either partial or complete damage of the underlying servers.
Moreover, such attacks against web applications can lead to massive financial and reputational damage for organizations. In most cases, organizations are unable to trace the root cause of an attack, which leaves security loopholes for the attackers to exploit. This is where web application forensics assumes significance. This module discusses the procedure of web application forensics, various types of attacks on web servers and applications, and where to look for evidence during an investigation. Furthermore, it explains how to detect and investigate various types of web-based attacks.
Module 10: Dark Web Forensics
The web as three layers: the surface web, deep web, and dark web. While the surface web and deep web are used for legitimate purposes, the dark web is mostly used by cyber criminals to perpetrate nefarious/antisocial activities. Access to the dark web requires the use of the Tor browser, which provides users a high level of anonymity through a complex mechanism, thereby allowing criminals to hide their identities.
This module outlines the fundamentals of dark web forensics, describes the working of the Tor browser, and discusses steps to perform forensic investigation of the Tor browser.
Module 11: Investigating Email Crimes
Over the past few decades, email services have been extensively used for communication all over the world for exchanging texts and multimedia messages. However, this has also made email a powerful tool for cybercriminals to spread malicious messages and perform illegal activities. The current module intends to familiarize you with the subject of email crimes and how they occur. It primarily focuses on the steps an investigator needs to follow in an email crime investigation.
Module 12: Malware Forensics
Currently, malicious software, commonly called malware, is the most efficient tool for compromising the security of a computer or any other electronic device connected to the internet. This has become a menace owing to the rapid progress in technologies such as easy encryption and data hiding techniques. Malware is the major source of various cyber-attacks and internet security threats; therefore, computer forensic analysts need to have the expertise to deal with them.
This module elaborately discusses the different types of malware, malware forensics fundamentals, and different types of malware analysis that investigators can perform to examine the malicious code and determine how the malware interacts with the system resources and the network during the runtime.
Cybersecurity Attack and Defense Fundamentals専門講座について
This Specialization can be taken by students, IT professionals, IT managers, career changers, and anyone who seeks a cybersecurity career or aspires to advance their current role. This course is ideal for those entering the cybersecurity workforce, providing foundational, hands-on skills to solve the most common security issues organizations face today.
This 3-course Specialization will help you gain core cybersecurity skills needed to protect critical data, networks, and digital assets. You will learn to build the foundation that enables individuals to grow their skills in specialized domains like penetration testing, security consulting, auditing, and system and network administration.

よくある質問
いつ講座や課題にアクセスできるようになりますか?
講義と課題へのアクセスは、登録のタイプによって異なります。聴講モードでコースを受講すると、ほとんどのコース教材を無料で見ることができます。採点された課題にアクセスして修了証を取得するには、聴講中または聴講後に、修了証エクスペリエンスを購入する必要があります。聴講オプションが表示されない場合:
コースは聴講オプションを提供していない可能性があります。代わりに無料トライアルをお試しいただくか、学資援助を申請することができます。
コースは、聴講オプションを提供せずに「修了証なしフルコース」オプションを提供する場合があります。このオプションでは、すべてのコース教材が表示され、必須の評価を提出して、最終成績を取得することができます。この場合、修了証エクスペリエンスは購入できません。
この専門講座をサブスクライブすると何を行うことができるようになりますか?
コースに登録する際、専門講座のすべてのコースにアクセスできます。コースの完了時には修了証を取得できます。電子修了証が成果のページに追加され、そこから修了証を印刷したり、LinkedInのプロフィールに追加したりできます。コースの内容の閲覧のみを希望する場合は、無料でコースを聴講できます。
学資援助はありますか?
はい。一部の学習プログラムでは、登録料が払えない場合、学資援助や奨学金を申請することができます。学習プログラムの選択において、学資援助や奨学金が利用可能な場合は、説明ページに申請するためのリンクが貼ってあります。
さらに質問がある場合は、受講者ヘルプセンターにアクセスしてください。