Course Description
As cybercrime grows increasingly sophisticated, the demand for professionals capable of investigating and analyzing digital evidence has surged. This course provides a structured approach to understanding the principles of digital forensics, the tools and technologies used, and the methodologies for preserving, analyzing, and presenting digital evidence in compliance with legal standards.
Through interactive lessons and practical exercises, you will learn how to collect, preserve, and analyze digital evidence effectively. By the end of the course, you will be equipped with the essential skills and knowledge to begin your journey as a digital forensics professional.
What you'll learn
After completing this course you will be able to :
• Define key concepts and recall the history of digital forensics, its relationship with cybersecurity, and relevant Egyptian legal practices.
• Explain the digital forensics process, methodologies, and the role of forensic tools in investigations.
• Demonstrate practical skills in acquisition, preservation, and analysis of digital evidence using tools like Linux DD, FTK Imager, and Autopsy.
• Perform file analysis and evaluate data integrity using commands like stat and hashing techniques.
• Differentiate between acquisition types, forensic methodologies, and analysis tools for various digital environments (e.g., Windows, Linux).
• Assess the suitability of tools and methods for specific forensic scenarios while ensuring the integrity of evidence.
• List functional digital forensic lab setup with essential hardware and software.
• Develop a structured workflow for acquisition and analysis phases, aligned with industry standards.
Requirements
Completion of these courses is required :
Computer Network Fundamentals.
Implementation of Computer Network Fundamentals.
Introduction to network security.