Welcome to our entry-level course for Digital Forensics! You’ll learn about evidence types, the Chain of Custody, as well as practical skills such as basic Linux commands, steganography and file carving techniques, as well as passworded ZIP file cracking. Using written material and practical challenges, this entry-level introduction course will give you a great insight into forensics, and how to perform a basic investigation. We hope you enjoy this course!
Below are the practical aspects that are included in this course, giving you a chance to put the knowledge you’ve learned into practice, and gain some hands-on experience.
LINUX COMMAND-LINE
You will learn how to use a linux terminal and basic commands to navigate through directories, find files, and interact with them. Commands taught include; cd, ls, cat, strings, head, find, locate, file.
You’ll learn how text can be hidden inside image and audio files using manual techniques and automated tools, as well as how to retrieve these messages using a number of methods.
In this activity you will be taught the difference between, and how to conduct dictionary and brute-force attacks to crack passworded ZIP files, allowing you to view the protected contents.
For this challenge, you’ll be performing an investigation on an employee’s hard-drive to uncover malicious activity. Using all of the techniques covered in this course, you’ll need to find hidden files, crack password-protected archives, discover messages hidden with steganography, and more.
Below is a list of the tools and services that this course will teach you how to use. Some tools or services may be missing from this list, so it should not be treated as a complete index for everything within the course.
Linux Command-Line Interface
fcrackzip
steghide
If you complete the final exam, you will be eligible to receive an e-certificate showing that you have completed this course and developed your network analysis fundamental skills! Great for sharing on LinkedIn to showcase your motivation and drive to develop your skills (plus we love hearing from our students!)
All content in this course is Copyrighted by Security Blue Team 2020. Any copying, redistributing, or sharing in any way to non-students is an unlawful breach of this copyright, and will result in legal action to claim for damages.
This website uses cookies to improve your experience. We do not share your data with any 3rd parties. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
Login
Accessing this course requires a login. Please enter your credentials below!