糖心vlog官网观看

Macquarie University
Cyber Security: Digital Forensics
Macquarie University

Cyber Security: Digital Forensics

Matt Bushby

Instructor: Matt Bushby

Included with 糖心vlog官网观看 Plus

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

1 week to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Conduct digital investigations and collect admissible evidence.

  • Analyse file systems, mobile devices, and network activity.

  • Use forensic tools to recover and examine deleted or hidden data.

  • Understand legal, ethical, and procedural standards in forensics.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

June 2025

Assessments

6 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Cyber Security: Essentials for Forensics Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 6 modules in this course

Digital forensics is the cornerstone of modern cyber investigations. In this topic, you'll gain a foundational understanding of the digital forensics process, from identifying and preserving digital evidence to analysing it systematically and presenting findings with integrity.You鈥檒l explore the different categories of computer investigations, understand the legal and ethical considerations that shape forensic practices across jurisdictions, and learn how to apply methodical, reproducible techniques to uncover digital truth. Whether responding to corporate breaches or criminal cases, this topic sets the stage for conducting forensic analysis with rigour, responsibility, and precision.

What's included

1 assignment7 plugins

Effective digital forensics begins with capturing the right data, the right way. This topic explores the critical process of acquiring and preserving digital evidence, whether in the field, on-site, or remotely, while maintaining forensic integrity.You鈥檒l learn how to determine the most appropriate data acquisition methods, develop robust contingency plans, and operate essential forensic tools to validate and safeguard collected evidence. The topic also dives into the techniques used by cybercriminals to hide or obscure data, and how forensic specialists can detect and counteract these evasive strategies. This is where technical precision meets investigative insight.

What's included

1 assignment9 plugins

File systems are rich sources of digital evidence, if you know where to look. In this topic, you'll explore how Windows, Linux, and MacOS file systems store, encrypt, and obscure critical data, and how forensic investigators can extract meaningful insights from them.You鈥檒l examine the structure and functionality of various file systems, delve into Windows Registry analysis to uncover user activity, and learn to navigate challenges like full-disk encryption and password-protected startup environments. From boot sequences to hidden artefacts, this topic equips you with the skills to uncover what lies beneath the surface of digital storage.

What's included

1 assignment6 plugins

Behind every successful digital investigation is a powerful toolkit. In this topic, you鈥檒l explore the essential software tools used in computer forensics to locate, extract, and recover evidence from various storage media. You鈥檒l learn how to evaluate and validate forensic tools based on reliability, speed, and investigative needs. Special focus is given to graphics file recovery, including strategies for identifying image formats, reconstructing files from raw data, and dealing with fragmented file recovery when metadata is missing or incomplete. This topic will sharpen your ability to choose the right tools and apply them with precision in complex investigations.

What's included

1 assignment5 plugins

When time is critical and data is volatile, live forensics becomes essential. This topic focuses on how to capture real-time evidence from active systems, including RAM, network traffic, and transient processes, before they disappear. You鈥檒l learn how to perform live acquisitions using specialist tools, understand when and how to apply live forensics techniques, and explore the risks, side effects, and legal considerations involved. Additionally, you鈥檒l gain experience with network forensics methodologies, from identifying intrusions and unauthorised access to monitoring network traffic with minimal disruption. This is where digital forensics meets the urgency of live incident response.

What's included

1 assignment4 plugins

In today鈥檚 hyper-connected world, mobile devices hold a wealth of digital evidence, from app activity and location data to communications and network usage. This topic explores the specialised field of mobile forensics, equipping you with the skills to extract, preserve, and analyse data from smartphones, tablets, and IoT devices. You鈥檒l learn industry-standard data acquisition techniques, how to reconstruct a suspect鈥檚 activity profile, and the unique challenges posed by modern mobile ecosystems, including encryption, proprietary systems, and distributed data across networks. Whether investigating fraud, cybercrime, or insider threats, this topic prepares you to follow the digital trail through mobile and smart technologies.

What's included

1 reading1 assignment5 plugins

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Matt Bushby
Macquarie University
14 Courses6,531 learners

Offered by

Explore more from Computer Security and Networks

Why people choose 糖心vlog官网观看 for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, 糖心vlog官网观看 is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. 糖心vlog官网观看 allows me to learn without limits."
糖心vlog官网观看 Plus

Open new doors with 糖心vlog官网观看 Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose 糖心vlog官网观看 for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

More questions