Cocok Banget Sama Kamu
Student
Fresh Graduate
Profesional

Digital Forensics Essentials

Biaya :

  • Rp 850.000 (mahasiswa)
  • On Call (umum professional/non professional)

 

Informasi tambahan:

  • Pelatihan dilaksanakan secara Daring (online)
  • Materi dapat diakses secara self-learning setelah pendaftaran.
  • Mendapat fasilitas latihan persiapan ujian bersama tutor hingga 4 sesi secara daring (Online).

Materi Yang Akan Kamu Dapetin

Melalui kursus ini, kamu akan mempelajari keterampilan untuk mengatasi tantangan utama dalam forensik komputer, menganalisis berbagai jenis bukti digital, dan memahami proses investigasi forensik komputer beserta tahapannya. Kamu juga akan memahami berbagai jenis drive disk, sistem file, serta metode dan metodologi akuisisi data yang canggih sambil mempelajari cara mengatasi teknik anti-forensik. Kursus ini membekalimu dengan kemampuan untuk mengumpulkan informasi volatil dan non-volatil dari sistem Windows, Linux, dan Mac, menyelidiki lalu lintas jaringan, serta melakukan korelasi peristiwa dalam forensik jaringan. Selain itu, kamu akan mempelajari analisis log server web, forensik aplikasi web, investigasi aktivitas dark web, analisis kejahatan melalui email, dan dasar-dasar forensik malware serta berbagai teknik analisis malware untuk memastikan keahlian forensik digital yang komprehensif.

Kurikulum

Topics Covered:

  • Fundamentals of Computer Forensics
  • Digital Evidence
  • Forensic Readiness
  • Roles and Responsibilities of a Forensic Investigator
  • Legal Compliance in Computer Forensics

Topics Covered:

  • Forensic Investigation Process and its Importance
  • Forensic Investigation Process – Pre investigation Phase
  • Forensic Investigation Process – Investigation Phase
  • Forensic Investigation Process – Post investigation Phase

Lab Exercise:

  • Performing Hash or HMAC Calculations
  • Comparing Hash Values of Files to Check their Integrity or Viewing Files of Various Formats
  • Creating a Disk Image File of a Hard Disk Partition

Topics Covered:

  • Different Types of Disk Drives and their Characteristics
  • Logical Structure of a Disk
  • Booting Process of Windows, Linux, and Mac Operating Systems
  • File Systems of Windows, Linux, and Mac Operating Systems
  • File System Examination

Lab Exercise:

  • Analyzing File System of a Linux Image
  • Recovering Deleted Files from Hard Disks

Topics Covered:

  • Data Acquisition Fundamentals
  • Types of Data Acquisition
  • Data Acquisition Format
  • Data Acquisition Methodology

Lab Exercise:

  • Creating a dd Image of a System Drive
  • Converting Acquired Image File to a Bootable Virtual Machine
  • Acquiring RAM from Windows Workstations
  • Viewing Contents of Forensic Image File

Topics Covered:

  • Anti-forensics and its Techniques
  • Anti-forensics Countermeasures

Lab Exercise:

  • SSD File Carving on a Windows File System
  • Recovering Data from Lost / Deleted Disk Partition
  • Cracking Application Passwords
  • Detecting Steganography

Topics Covered:

  • Volatile and Non-Volatile Information
  • Windows Memory and Registry Analysis
  • Cache, Cookie, and History Recorded in Web Browsers
  • Windows Files and Metadata

Lab Exercise:

  • Acquiring Volatile Information from a Live Windows System
  • Investigating Forensic Image of Windows RAM
  • Examining Web Browser Artifacts
  • Extracting Information about Loaded Processes on a Computer

Topics Covered:

  • Volatile and Non-Volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Memory Forensics
  • Mac Forensics

Lab Exercise:

  • Forensic Investigation on a Linux Memory Dump
  • Recovering Data from a Linux Memory Dump

Topics Covered:

  • Network Forensics Fundamentals
  • Event Correlation Concepts and Types
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  •  

Lab Exercise:

  • Identifying and Investigating Various Network Attacks using Wireshark

Topics Covered:

  • Web Application Forensics
  • IIS and Apache Web Server Logs
  • Investigating Web Attacks on Windows-based Servers
  • Detect and Investigate Attacks on Web Applications

Lab Exercise:

  • Identifying and Investigating Web Application Attacks Using Splunk

Topics Covered:

  • Dark Web
  • Dark Web Forensics
  • Tor Browser Forensics

Lab Exercise:

  • Detecting TOR Browser on a Machine
  • Analyzing RAM Dumps to Retrieve TOR Browser Artifacts

Topics Covered:

  • Email Basics
  • Email Crime Investigation and its Steps

Lab Exercise:

  • Investigating a Suspicious Email

Topics Covered:

  • Malware, its Components and Distribution Methods
  • Malware Forensics Fundamentals and Recognize Types of Malware Analysis
  • Static Malware Analysis
  • Analyze Suspicious Word Documents
  • Dynamic Malware Analysis
  • System Behavior Analysis
  • Network Behavior Analysis

Lab Exercise:

  • Performing Static Analysis on a Suspicious File
  • Forensic Examination of a Suspicious Microsoft Office Document
  • Performing System Behavior Analysis

Fasilitator

Verified by MonsterInsights