Course description

This module focuses on the "Detective" side of cybersecurity. Digital Forensics is the practice of uncovering the "who, what, when, and how" after a security breach or criminal act has occurred.

You will learn the rigorous legal and technical standards required to handle digital evidence without compromising its integrity. The course covers everything from memory forensics (analyzing RAM) and disk imaging to mobile device forensics and network trail analysis. You will use industry-standard tools like Autopsy, FTK Imager, and Volatility to piece together digital puzzles. Whether you are aiming to work for law enforcement, a private corporate investigation team, or an incident response unit, this module provides the specialized skills needed to solve complex digital crimes.

What will i learn?

  • Evidence Acquisition: Perform bit-by-bit imaging of hard drives while maintaining a strict "Chain of Custody."
  • Memory Forensics: Analyze volatile memory (RAM) to find running malware or hidden processes that disappear on reboot.
  • Artifact Analysis: Extract browsing history, deleted emails, and hidden files from Windows, Linux, and MacOS systems.
  • Network Forensics: Reconstruct web sessions and file transfers from captured network packets (PCAP files).
  • Expert Reporting: Document your findings in a professional forensic report suitable for use in a court of law or corporate hearing.

Requirements

  • Strong understanding of File Systems (FAT32, NTFS, EXT4).
  • Completion of the CompTIA Security+ or Ethical Hacking module.
  • Basic knowledge of Windows Registry and system logs.
  • A computer with at least 12GB RAM (recommended) to handle large forensic images and memory dumps.

Frequently asked question

Ethical Hacking is about preventing or testing a breach. Digital Forensics is about investigating what happened after a breach or crime has already taken place.

This course provides the technical foundation used by law enforcement agencies (like the EFCC or Interpol) and private forensic firms. Additional legal certifications may be required depending on your jurisdiction.

While professional labs use hardware "Write Blockers," we will use software-based tools and specialized Linux distributions (like CAINE or SANS SIFT) to simulate a professional forensic environment.

faramaye Ireoluwa Victor

₦550000

₦600000

Lectures

0

Skill level

Advanced

Expiry period

2 Months

Certificate

Yes

Share this course

Related courses