Welcome to our entry-level course for Digital Forensics! You’ll learn about evidence types, the Chain of Custody, as well as practical skills such as basic Linux commands, steganography and file carving techniques, as well as passworded ZIP file cracking. Using written material and practical challenges, this entry-level introduction course will give you a great insight into forensics, and how to perform a basic investigation. We hope you enjoy this course!
Below are the practical aspects that are included in this course, giving you a chance to put the knowledge you’ve learned into practice, and gain some hands-on experience.
You will learn how to use a linux terminal and basic commands to navigate through directories, find files, and interact with them. Commands taught include; cd, ls, cat, strings, head, find, locate, file.
You’ll learn how text can be hidden inside image and audio files using manual techniques and automated tools, as well as how to retrieve these messages using a number of methods.
PASSWORD ZIP CRACKING
In this activity you will be taught the difference between, and how to conduct dictionary and brute-force attacks to crack passworded ZIP files, allowing you to view the protected contents.
Course challenge: Employee Investigation
For this challenge, you’ll be performing an investigation on an employee’s hard-drive to uncover malicious activity. Using all of the techniques covered in this course, you’ll need to find hidden files, crack password-protected archives, discover messages hidden with steganography, and more.
Below is a list of the tools and services that this course will teach you how to use. Some tools or services may be missing from this list, so it should not be treated as a complete index for everything within the course.
- Linux Command-Line Interface
If you complete the final exam, you will be eligible to receive an e-certificate showing that you have completed this course and developed your network analysis fundamental skills! Great for sharing on LinkedIn to showcase your motivation and drive to develop your skills (plus we love hearing from our students!)
All content in this course is Copyrighted by Security Blue Team 2020. Any copying, redistributing, or sharing in any way to non-students is an unlawful breach of this copyright, and will result in legal action to claim for damages.