Skip links

Ec-council | Learning

The Bases of Digital Forensics

Master the basics of digital forensics: computer investigation, dark web, Windows, Linux, malware, and 28 hands-on laboratories.

About Digital Forensics Essentials Course

Course outline

Course outline

  • Fundamentals of computer forensics
  • Investigation process in computer forensics
  • Understanding hard drives and file systems
  • Data acquisition and duplication
  • Anti-forensic techniques
  • Windows Criminalism
  • Linux and Mac Criminalism
  • Criminal network
  • Survey of web attacks
  • Criminalistic dark web
  • Investigation of e-mail crimes
  • Criminalistic malware

Objectives of the course

  • Discuss basic concepts of computer forensics, digital evidence, preparation for forensics, identify roles and responsibilities of a forensic investigator, and review issues of legal compliance in computer forensics.

  • Review the computer forensic investigation process and its phases.

  • Describe the different types of hard drives, their characteristics and logical structure, understand the start-up processes of Windows, Linux and Mac, and examine various file systems and formats.

  • Discuss data acquisition concepts, types, formats and methodology.

  • Examine various anti-forensic techniques and identify countermeasures.

  • Examine various techniques for collecting volatile and non-volatile information for Windows, Linux and Mac systems, including Windows memory and registry analysis, cache analysis, cookies, history analysis and metadata review.

  • Explain the basics of network forensics, correlation of events and conduct a network traffic investigation.

  • Understand web server logs and perform a forensic web application to detect and investigate various attacks on web applications.

  • Discuss the operation of the dark web and messaging systems, and perform forensics of the dark web, the TOR browser and emails.

  • Discuss the basics of malware forensics, draw up a list and perform different types of malware analysis.

Review

Success Score

In order to maintain the high integrity of our certification examinations, EC-Council examinations are provided in several forms (i.e. different question banks). Each form is carefully analysed through beta tests with an appropriate sample group under the supervision of a committee of experts in the field that ensures that each of our examinations has not only academic rigour but also applicability. « in the real world ». We also have a process to determine the difficulty score for each question. The individual grade then contributes to a « Cut Score » for each form of examination. To ensure that each form has equal evaluation standards, cut-off scores are set on a basis « by form of examination ». Depending on the form of examination being contested, cut-off scores may vary from 60% to 78%.

Details of the examination

  • Duration of examination 2 hours
  • Format of the review : Multiple choices
  • Review platform : ECC Review Centre
  • Number of questions : 75
  • Certification : Digital Forensics Essentials

Roles

    • Technical Support Technician
    • Technical Support Officer
    • Office Support Technician
    • Cybercrime Analyst
    • Cybersecurity Specialist
    • Cyber Security Technician
    • Office support
    • Office Support Technician
    • Network administrator
    • Incident and intrusion analyst
    • Information Security Officer
    • Network technical specialist
    • Cybercriminalist Specialist
    • Intelligence Operations Officer
    • Cyber Operations Technician

The most complete DFE package on the market!

the DFE, which includes the following:

Online course for one year

Examination voucher

Official laboratories for 6 months

Preparation for examination

This website uses cookies to improve your web experience.
EnglishenEnglishEnglish
0