Department of Cybersecurity, Faculty of Computing, University of Port Harcourt

Digital Forensics Essentials (D|FE)

Labs w/CTF, Exam Prep, ECC EV w/RPS

Begin your Cybersecurity Journey with Hands-on, Foundational Skills in Digital Forensics

Self Paced (Discount)

₦197,183

Tutor Led (Discount)

₦347,183

Official Price

₦508,300

EC-Council Digital Forensics Essentials

The Digital Forensics Essentials (D|FE) is an entry-level foundational course to help beginners grasp the facets of digital forensics investigation, its phases, and types. This course covers topics like dark web forensics, Linux, investigating web applications, and more. No IT/Cybersecurity experience required for this course.

Test your skills with CTF-based Capstone Projects and validate these newly acquired skills in proctored exams. The D|FE course aims to enhance your competency and expertise in digital forensics and information security skills offering 12 comprehensive modules, 11 hours of premium self-paced video training, courseware, and 11 labs.

Key Features
  • 11+ hours of premium self-paced video training
  • 11 lab activities in a simulated lab environment
  • 750+ pages of ecourseware
  • Capstone Projects with Real-World CTF Challenges
  • Gain a year-long access to courseware and 6-month access to labs
  • Proctored exam voucher with one-year validity
  • Gain the globally recognized EC-Council’s certification
  • Enhance your relevancy in the job market

Digital Forensics Essentials (D|FE) Program Information

Module 01: Computer Forensics Fundamentals

Topics Covered:

  • Fundamentals of Computer Forensics
  • Digital Evidence
  • Forensic Readiness
  • Roles and Responsibilities of a Forensic Investigator
  • Legal Compliance in Computer Forensics

Topics Covered:

  • Forensic Investigation Process and its Importance
  • Forensic Investigation Process – Pre investigation Phase
  • Forensic Investigation Process – Investigation Phase
  • Forensic Investigation Process – Post investigation Phase
  • Labs:
  • Performing Hash or HMAC Calculations
  • Comparing Hash Values of Files to Check their Integrity or Viewing Files of Various Formats
  • Creating a Disk Image File of a Hard Disk Partition

Topics Covered:

  • Different Types of Disk Drives and their Characteristics
  • Logical Structure of a Disk
  • Booting Process of Windows, Linux, and Mac Operating Systems
  • File Systems of Windows, Linux, and Mac Operating Systems
  • File System Examination
  • Labs:
  • Analyzing File System of a Linux Image
  • Recovering Deleted Files from Hard Disks

Topics Covered:

  • Data Acquisition Fundamentals
  • Types of Data Acquisition
  • Data Acquisition Format
  • Data Acquisition Methodology
  • Labs:
  • Creating a dd Image of a System Drive
  • Converting Acquired Image File to a Bootable Virtual Machine
  • Acquiring RAM from Windows Workstations
  • Viewing Contents of Forensic Image File

Topics Covered:

  • Anti-forensics and its Techniques
  • Anti-forensics Countermeasures
  • Labs:
  • SSD File Carving on a Windows File System
  • Recovering Data from Lost / Deleted Disk Partition
  • Cracking Application Passwords
  • Detecting Steganography

Topics Covered:

  • Volatile and Non-Volatile Information
  • Windows Memory and Registry Analysis
  • Cache, Cookie, and History Recorded in Web Browsers
  • Windows Files and Metadata
  • Labs:
  • Acquiring Volatile Information from a Live Windows System
  • Investigating Forensic Image of Windows RAM
  • Examining Web Browser Artifacts
  • Extracting Information about Loaded Processes on a Computer
Module 07: Linux and Mac Forensics

Topics Covered:

  • Volatile and Non-Volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Memory Forensics
  • Mac Forensics
  • Labs:
  • Forensic Investigation on a Linux Memory Dump
  • Recovering Data from a Linux Memory Dump

Topics Covered:

  • Network Forensics Fundamentals
  • Event Correlation Concepts and Types
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  • Labs:
  • Identifying and Investigating Various Network Attacks using Wireshark

Topics Covered:

  • Web Application Forensics
  • IIS and Apache Web Server Logs
  • Investigating Web Attacks on Windows-based Servers
  • Detect and Investigate Attacks on Web Applications
  • Labs:
  • Identifying and Investigating Web Application Attacks Using Splunk

Topics Covered:

  • Dark Web
  • Dark Web Forensics
  • Tor Browser Forensics
  • Labs:
  • Detecting TOR Browser on a Machine
  • Analyzing RAM Dumps to Retrieve TOR Browser Artifacts

Topics Covered:

  • Email Basics
  • Email Crime Investigation and its Steps
  • Lab:
  • Investigating a Suspicious Email

Topics Covered:

  • Malware, its Components and Distribution Methods
  • Malware Forensics Fundamentals and Recognize Types of Malware Analysis
  • Static Malware Analysis
  • Analyze Suspicious Word Documents
  • Dynamic Malware Analysis
  • System Behavior Analysis
  • Network Behavior Analysis
  • Lab Exercise:
  • Performing Static Analysis on a Suspicious File
  • Forensic Examination of a Suspicious Microsoft Office Document
  • Performing System Behaviour Analysis
  • Key issues plaguing computer forensics
  • Different types of digital evidence
  • Computer forensic investigation process and its phases
  • Different types of disk drives and file systems
  • Data acquisition methods and data acquisition methodology
  • Anti-forensics techniques and countermeasures
  • Volatile and non-volatile information gathering from Windows, Linux, and Mac Systems
  • Network forensics fundamentals, event correlation, and network traffic investigation
  • Web server logs and web applications forensics
  • Dark web forensics
  • Email crime investigation
  • Malware forensics fundamentals and different types of malware analysis
  • Students, graduates, professionals, career starters and changers, and IT/technology/cybersecurity teams with little or no prior work experience.
  • High school students who want to get an early start on their cybersecurity careers and master the fundamentals of security online.
  • College or University students interested in preparing for a cybersecurity career and aiding their IT education.
  • Working professionals who want to get into the cybersecurity field and don’t know where to start their education journey.

Training Details: Self-paced in-demand lecture videos led by world-class instructors and hands-on labs.

Pre-requisite: No prior cybersecurity knowledge or IT work experience required.

Exam Details:

  • Exam Code: 112-53
  • Number of Questions: 75
  • Duration: 2 hours
  • Test Format: Multiple Choice
  • Approved by the United States, Florida DOE (Department of Education) as industry-recognized credentials on the Florida Career and Professional Education Act (CAPE) for secondary education.
  • Approved by the state of Virginia Department of Education Career and Technical Education as industry-recognized credentials.
  • Approved by the Ohio DOE (Department of Education) and Workforce as an industry-recognized credentials list.
  • Approved by the Career and Technical Education division within the Arkansas DOE as industry-recognized credentials.

Secure Your Future in Cybersecurity !!!

  • 100% Discount on Training Fees
  • Tutor-Led Training at an Affordable Rate
  • 12-Month Access to Labs & Study Materials
  • Earn Globally Recognized EC-Council Certifications