Digital forensics is the process of recovery and investigation of digital artifacts involved in a cybercrime. This course will teach you the basics of evidence integrity, acquisition, examination, and analysis to finally create a forensics timeline.
Digital forensics is now back in focus with the rapid increase in cybercrimes. In this course, Digital Forensics: Getting Started, you'll learn the skills required to conduct a digital forensics investigation from acquisition to the analysis phase. First, you'll discover the process of hypothesis testing by applying forensic science techniques to digital forensics. Next, you’ll explore how to overcome the challenges of digital evidence by using evidence integrity methods such as write blockers and verifying hashes. Finally, you'll learn how to examine the Windows Registry files and create a timeline of events for your case. When you’re finished with this course, you'll have a foundational understanding of the digital forensics domain that will help you conduct successful cybercrime investigations.
Shoaib is a Senior Cyber Security Professional with a strong background in the Information Security domain. He has worked in various roles such as Security Engineer, Pentester, Forensic Examiner, Incident Handler, IT Auditor and also as a Cyber Security Consultant.
Course Overview Hello, everyone. My name is Shoaib Arshad, and welcome to my course, Digital Forensics: Getting Started. I'm a senior cybersecurity professional with more than a decade of experience in information security and digital forensics. Did you know that by following a robust digital forensics process, you can prevent going down rabbit holes and save valuable time during your investigations? This is a very hands‑on course, and we will be conducting a cybercrime investigation for a data theft case. First, we will examine and analyze the event flow registry and then create a timeline of events for our case. Some of the major topics that we will cover include applying forensic science techniques to digital forensics, maintaining evidence integrity using various methods. We will also cover some of the core investigative concepts for digital forensics and how to follow a comprehensive digital forensics process and then finally create a forensics timeline of events. By the end of this course, you will have a solid foundation of digital forensics that will help you get started to conducting successful cybercrime investigations. I hope you'll join me on this journey to learn digital forensics with the Digital Forensics: Getting Started course at Pluralsight.