starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Curriculum
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Digital Forensics Essentials

Digital Forensics Essentials

Learn the fundamentals of digital forensics, how to collect, analyse, & report digital evidence using tools like FTK Imager and Autopsy. Gain hands-on skills in data recovery, chain of custody, and forensic reporting for cybersecurity investigations

Gilbert George
Gilbert George
Cybersecurity | intermediate | 9 hours |   Published: Oct 2025

    Discussions

Overview

STUDENTS*
RECOMMEND*

This course includes:

  • On-demand videos
  • Practice assessments
  • Multiple hands-on learning activities
  • Exposure to a real-world project
  • 100% self-paced learning opportunities
  • Certification of completion

Are You Ready to Uncover the Truth Hidden in Digital Evidence? 

Digital forensics is not just for law enforcement agents and agencies, it is for anyone who wants to understand how to investigate cyber-incidents, recover deleted files, trace unauthorized activity, and ensure the integrity of digital systems.  

In a world where almost every crime has a digital footprint, knowing how to collect and analyse that evidence is essential. Whether you want to pursue a career in cybersecurity, protect your organization from insider threats, or simply understand how digital investigations work, this course is your gateway to the fast-growing field of digital forensics. 

 

This beginner-friendly course will demystify the process of digital investigation and give you the confidence to analyze data, use forensic tools, and build defensible reports. You’ll explore file systems, memory analysis, data acquisition, and reporting techniques all through clear explanations and practical hands-on labs. 

Unlike a one-size-fits-all tutorial, digital forensics requires precision, patience, and a strong sense of ethics. This course will guide you step-by-step through real-world scenarios, forensic best practices, and essential toolkits to help you uncover and preserve digital evidence with clarity and confidence. 

Skills You Will Gain

File recovery and artifact analysis
Forensic investigation training
Digital forensics certification prep
Cybercrime investigation fundamentals

Learning Outcomes (At The End Of This Program, You Will Be Able To...)

  • Explain the role and scope of digital forensics in cybersecurity investigations. 
  • Apply standard procedures to collect and preserve digital evidence using forensic tools. 
  • Perform basic forensic analysis on digital media using industry-standard tools. 
  • Create concise reports documenting digital evidence and analysis findings. 

Prerequisites

Basic computer literacy, Familiarity with operating systems (Windows and/or Linux), Curiosity about cybersecurity or crime investigation 

Who Should Attend

IT professionals transitioning into cybersecurity, Computer science students and beginners, Law enforcement or legal professionals interested in digital evidence and Anyone curious about cybercrime investigation. 

Curriculum

Instructors

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Chapter 1: Introduction to Digital Forensics
2Chapter 2: Scope of Digital Forensics in Cybersecurity
3Chapter 3: Legal, Ethical, and Professional Considerations
4Chapter 4: The Evidence Acquisition Process
5Chapter 5: Using Forensic Tools for Disk Imaging
6Chapter 6: Preserving Evidence and Chain of Custody
7Chapter 7: Analyzing File Systems and Metadata
8Chapter 8: Investigating User Activity and System Artifacts
9Chapter 9: Timeline Creation and Evidence Correlation
10Chapter 10: Structure and Components of a Forensic Report
11Chapter 11: Documenting Evidence and Chain of Custody
12Chapter 12: Finalizing and Presenting Your Forensic Report

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 00 - Introduction to the course

Segment 01 - What Is Digital Forensics v2

Segment 02 - The Forensic Process

Segment 03 - Types of Digital Evidence

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 04 - Where Digital Forensics Fits in the Cybersecurity Life Cycle

Segment 05 - Real-World Use Cases- Insider Threats

Segment 06 - Potential Sources of Evidence

Segment 07 - Reading - A Proactive Approach to Network Forensics Intrusion Using Dynamic Features Selection and Convolution Neural Network

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 21 - Maintaining Forensic Soundness

Segment 22 - Chain of Custody Concept and Importance

Segment 23 - Labelling and Evidence Bagging Procedures

Segment 24 - Quiz - Preserving Evidence and Chain of Custody

Segment 25 - Reading - Protecting Digital Evidence Integrity and Preserving Chain of Custody

Segment 26 - Hands-On-Learning - Browser History and Registry Artifact Analysis

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 07 - Chain of Custody and Admissibility in Court

Segment 08 - Privacy_ Consent_ and Ethical Boundaries

Segment 09 - Regional and International Laws Impacting Digital Evidence

Segment 12 - Quiz - Legal, Ethical, and Professional Considerations

Segment 13 - Reading - What Is Digital Chain of Custody

Segment 14: Hands-On-Learning - Matching the Digital Forensics Process with the Right Activity

Gilbert George

Gilbert George

Dr Gilbert George is a dedicated and accomplished computer science lecturer with a passion for both teaching and research. With over a decade of experience in academia and industry, he brings a wealth of knowledge and expertise to the classroom, inspiring students and contributing to the field of computer science, cybersecurity and artificial intelligence.
VIEW MY CHANNEL

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 18 - Disk Imaging with FTK Imager and Analysis in Autopsy-

Segment 19 - Bit-by-Bit Imaging Using DD (Linux CLI)

Segment 20 - Hashing for Integrity (MD5 - SHA1 - SHA256)

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 41 - Evidence Storage and Management in a Cloud Environment

Segment 42 - Completing and Preserving Chain of Custody Forms

Segment 43 - Anti-Forensic Techniques and Mitigation Strategies 

Segment 44 - Screenshots and Supporting Visual Evidence 

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 45 - Writing Clear Conclusions Based on Evidence 

Segment 46 - Case Review and Criticism 

Segment 47 - Ethics and Responsibility in Reporting 

Segment 48 - Hands-On-Learning - Drafting a Forensic Mini-Report with Screenshots

Segment 49 - Quiz - Finalizing and Presenting Your Forensic Report

Segment 50 - Project - Case Study – The Drug Dealer Investigation

Segment 51 - Course Wrap-up Video

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 31 - Timeline Creation Using Autopsy

Segment 32 - Correlating Data Across Artifacts and Sources

Segment 33 - Interpreting Anomalies and Suspicious Gaps

Segment 34 - Reading - An Abstraction Based Approach for Reconstruction of TimeLine in Digital Forensics

Segment 35 - Quiz - Timeline Creation and Evidence Correlation

Segment 36 - Hands-On-Learning - Building a Forensic Timeline in Autopsy

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 15 - Types of Acquisition and Image Formats

Segment 16 - Precautions During Evidence Handling-

Segment 17 - Write Blockers and Imaging Best Practices-

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 27 - Analyzing Browser History and Cookies 

Segment 28 - Prefetch Files and Registry Analysis (Windows)

Segment 29 - Tracking Document Access and USB Device Usage_1

Segment 30 - Interpreting Log Files (Windows Event Logs_ Syslog)

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 27 - Understanding NTFS_ FAT32_ and EXT File Systems 

Segment 28 - Metadata- MAC Times (Modified_ Accessed_ Created)

Segment 26 - Recovering Hidden_ Deleted_ or Orphaned Files

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 37 - Purpose and Structure of a Forensic Report

Segment 38 - Required Sections Executive Summary_ Methodology_ Findings_ Conclusions

Segment 39 - Writing for Non-Technical Audiences

Segment 40 - Common Mistakes to Avoid (e.g._ Bias_ Jargon_ Vague Language)