Select a different country or region to see content specific to your location and make online purchases.
Filter Events

EC-Council Digital Forensics Essentials


Ec Council Training Courses Certification


See all Courses


Computer Forensics Fundamentals

  • Fundamentals of computer forensics and digital evidence
  • Objectives of forensic readiness to reduce the cost of investigation
  • Roles and responsibilities of a forensic investigator.
  • Legal compliance in computer forensics

Computer Forensics Investigation Process

  • Forensic investigation process and its importance
  • Forensic investigation phases

Understanding Hard Disks and File Systems

  • Types of disk drives and their characteristics
  • Booting process of Windows, Linux, and Mac operating systems
  • Examine file system records during an investigation

Data Acquisition and Duplication

  • Data acquisition fundamentals, methodologies, and their different types
  • Determine the data acquisition format

Defeating Anti-forensics Techniques

  • Anti-forensics techniques and their countermeasures

Windows Forensics

  • How to gather volatile and non-volatile information
  • Perform Windows memory and registry analysis
  • Analyze the cache, cookie, and history recorded in web browsers
  • Examine Windows files and metadata

Linux and Mac Forensics

  • Volatile and non-volatile data in Linux
  • Analyze filesystem images using the sleuth kit
  • Demonstrate memory forensics
  • Mac forensics concepts

Network Forensics

  • Network forensics fundamentals
  • Event correlation concepts and types
  • Identify indicators of compromise (IoCs) from network logs
  • Investigate network traffic for suspicious activity

Investigating Web Attacks

  • Web application forensics and web attacks
  • Understand IIS and Apache web server logs
  • Detect and investigate various attacks on web applications

Dark Web Forensics

  • Dark web forensics investigation and how it works.
  • Tor browser forensics

Investigating Email Crime

  • Email basics and how it can be used as evidence
  • Techniques and steps used in email crime investigation

Malware Forensics

  • Malware, its components, and distribution methods
  • Malware forensics fundamentals and types of malware analysis
  • Perform static malware analysis and dynamic malware analysis
  • Conduct system and network behavior analysis

The description for this course is currently being updated.

EC-Council’s Essentials Series is the first MOOC certification course series covering essential skills in network defense, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students and early career professionals choose their area of competency or select a specific interest in cybersecurity. The Essentials Series was designed to give students the foundation on which to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs educate learners in a range of techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.

The description for this course is currently being updated.
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.