Discuss basic concepts of computer forensics, digital evidence, preparation for forensics, identify roles and responsibilities of a forensic investigator, and review issues of legal compliance in computer forensics.
Review the computer forensic investigation process and its phases.
Describe the different types of hard drives, their characteristics and logical structure, understand the start-up processes of Windows, Linux and Mac, and examine various file systems and formats.
Discuss data acquisition concepts, types, formats and methodology.
Examine various anti-forensic techniques and identify countermeasures.
Examine various techniques for collecting volatile and non-volatile information for Windows, Linux and Mac systems, including Windows memory and registry analysis, cache analysis, cookies, history analysis and metadata review.
Explain the basics of network forensics, correlation of events and conduct a network traffic investigation.
Understand web server logs and perform a forensic web application to detect and investigate various attacks on web applications.
Discuss the operation of the dark web and messaging systems, and perform forensics of the dark web, the TOR browser and emails.
Discuss the basics of malware forensics, draw up a list and perform different types of malware analysis.
Ec-council | Learning
The Bases of Digital Forensics

Master the basics of digital forensics: computer investigation, dark web, Windows, Linux, malware, and 28 hands-on laboratories.
About Digital Forensics Essentials Course
Course outline
Course outline
- Fundamentals of computer forensics
- Investigation process in computer forensics
- Understanding hard drives and file systems
- Data acquisition and duplication
- Anti-forensic techniques
- Windows Criminalism
- Linux and Mac Criminalism
- Criminal network
- Survey of web attacks
- Criminalistic dark web
- Investigation of e-mail crimes
- Criminalistic malware
Objectives of the course
Review
Success Score
In order to maintain the high integrity of our certification examinations, EC-Council examinations are provided in several forms (i.e. different question banks). Each form is carefully analysed through beta tests with an appropriate sample group under the supervision of a committee of experts in the field that ensures that each of our examinations has not only academic rigour but also applicability. « in the real world ». We also have a process to determine the difficulty score for each question. The individual grade then contributes to a « Cut Score » for each form of examination. To ensure that each form has equal evaluation standards, cut-off scores are set on a basis « by form of examination ». Depending on the form of examination being contested, cut-off scores may vary from 60% to 78%.
Details of the examination
- Duration of examination 2 hours
- Format of the review : Multiple choices
- Review platform : ECC Review Centre
- Number of questions : 75
- Certification : Digital Forensics Essentials
Roles
- Technical Support Technician
- Technical Support Officer
- Office Support Technician
- Cybercrime Analyst
- Cybersecurity Specialist
- Cyber Security Technician
- Office support
- Office Support Technician
- Network administrator
- Incident and intrusion analyst
- Information Security Officer
- Network technical specialist
- Cybercriminalist Specialist
- Intelligence Operations Officer
- Cyber Operations Technician


