Digital Forensics Essentials (DFE)

About this Course

The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex technologies to be successful in their mission. Due to the complexity of the attack, investigating a crime in the cyber world has become increasingly difficult to do. Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conducting audits to prevent the future attacks. It is used in different types of investigations like crime and civil investigation, corporate litigation, cybercrime etc. It plays a vital role in the investigation and prosecution of cybercriminals. It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment so that the discovered evidence can be used during a legal and/or administrative proceeding in a court of law. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Digital Forensics Essentials (DFE) is a security program covering the fundamental concepts of computer forensics. It equips students with the skills required to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in a court of law. This program will give a holistic overview of the key components of computer forensics. It provides a solid fundamental knowledge required for a career in computer forensics. Why is DFE Important? § It facilitates your entry into the world of computer forensics § It provides a professional understanding of the concepts of computer forensics § It enhances your skills as a Computer Forensics Specialist and increases your employability

Created by: EC-Council

Level: Intermediate


Related Online Courses

This is CS50's introduction to technology for students who don’t (yet) consider themselves computer persons. Designed for those who work with technology every day but don’t necessarily und... more
Source code management systems are where code, ci-scripts, and Infrastructure as Code (IaC) scripts are stored and managed. That means that properly protecting the SCM is an important step towards... more
Meeting growing global energy demand, while mitigating climate change and environmental impacts, requires a large-scale transition to clean, sustainable energy systems. Students and professionals... more
This course takes you through lessons 14 through 18 of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. In this course,... more
In this revised course, in depth video lectures cover various concepts related to architecture and structural design are presented and are accompanied by detailed articles for further study. Modern... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL