EC-Council Digital Forensics Essentials (DFE) Certificate

 



Thank you to the EC-Council team for providing this course.

My final assessment passing score was 21 out of 25.

I am happy that I have completed the Digital Forensics Essentials (DFE) course by EC-Council. It really helped me increase my knowledge in the digital forensics space and also brush up on some of the most important key knowledge factors in cyber security.

The course covered the following modules:

Module 1: 💻 Computer Forensics Fundamentals

Module 2: 🕵️‍♂️ Computer Forensics Investigation Process

Module 3: 💽 Understanding Hard Disks and File Systems

Module 4: 📁 Data Acquisition and duplication

Module 5: 🕵️‍♂️ Defeating Anti-Forensics Techniques

Module 6: 🪟 Windows Forensics

Module 7: 🐧 Linux and Mac Forensics

Module 8: 🌐 Network Forensics

Module 9: 🌐 Investigating Web Attacks

Module 10: 🌑 Dark Web Forensics

Module 11: ✉️ Investigating Email Crimes

Module 12: 🦠 Malware Forensics

The following are key points of what I learned in each module:

Module 1: 💻 Computer Forensics Fundamentals

In this module, I learned about the basic concepts and principles of computer forensics. I have covered topics like the importance of preserving evidence, the legal aspects of digital investigations , and the chain of custody .

This module provides a foundation for understanding the role of forensics in cyber investigations. Understanding the fundamentals is crucial to ensure that evidence is collected, preserved, and presented correctly in a court of law, which is essential in both criminal and civil cybersecurity cases.

Module 2: 🕵️‍♂️ Computer Forensics Investigation Process

I learned about the steps involved in conducting a computer forensics investigation . I have learned about the importance of following a structured process , including identification, preservation, collection, examination, analysis, and reporting of digital evidence.

A well-defined investigation process is crucial in cybersecurity to ensure that no evidence is lost or tampered with during an investigation, maintaining its integrity and reliability . This process is important during court procedures.

Module 3: 💽 Understanding Hard Disks and File Systems

For this one, I covered the technical aspects of hard disks and file systems. This taught me how data is stored and organized on computer storage devices. Understanding these aspects is vital in cybersecurity, as it allows investigators to locate and extract valuable digital evidence effectively, even when data may be hidden or deleted .

Module 4: 📁 Data Acquisition

This was a reaaly good one. Data acquisition involves the process of gathering digital evidence from various sources, such as computers , mobile devices, and servers . I learned about data acquisition methods which is essential in cyber investigations because it enables forensic experts to capture and preserve digital evidence without altering or contaminating it .

Module 5: 🕵️‍♂️ Defeating Anti-Forensics Techniques

For this module, it started to get really interesting. This module covered techniques used by cybercriminals to erase or hide their tracks. Knowledge in this area is crucial for cybersecurity professionals to identify and overcome these tactics, ensuring that crucial evidence is not lost.

Hey there :) , Thank you so much for reading my medium blog and I hope you find what you are looking for. If you found my content helpful, you can support me in making the digital space safe for everyone by buying me coffee on the following link:

Buy me coffee

Module 6: 🪟 Windows Forensics

I use Windows everyday. This can be at work or home. This was a very valuable module. Windows is one of the most widely used operating systems, making it a prime target for cyberattacks. Understanding Windows forensics is vital for investigators to analyze Windows-based systems and identify potential security breaches , malware infections, or unauthorized activities.

Module 7: 🐧 Linux and Mac Forensics

I use Linux a lot on TryHackMe, so I made sure I understand the ins and outs of Linux and MAC when watching this module. Similar to Windows, Linux and macOS forensics are important because they provide insights into potential cybersecurity incidents on non-Windows platforms. This knowledge is valuable for investigators dealing with diverse environments and uncovering evidence on various operating systems .

Module 8: 🌐 Network Forensics

Most of my experience in the IT space comes from working as a network engineer. This module was close to my area of interest. Network forensics focuses on monitoring and analyzing network traffic to identify and investigate security incidents. Understanding network forensics is crucial for tracking cyber threats, identifying intrusions, and gathering evidence in cases related to network-based attacks.

Module 9: 🌐 Investigating Web Attacks

I learned to investigate web attacks. This helped me understand and respond to online threats, ensuring the security of websites, applications, and online services.

Module 10: 🌑 Dark Web Forensics

I learned about the dark web illegal activities️. Knowledge of dark web forensics is essential for tracking cybercriminals and uncovering illegal operations conducted on this hidden network. Basically, understanding how to track footprints in the snow.

Module 11: ✉️ Investigating Email Crimes

I leaned how to start Investigating email crimes which helps in tracing the origins of malicious emails and linking them to their perpetrators. There is no hiding here. This was a cool module.

Module 12: 🦠 Malware Forensics

Although malware analysis is not my main area of speciality, but this was an interesting module. I learned how malware forensics equips investigators with the skills to dissect and analyze malicious software, which helps in understanding its behavior, origins, and the impact it may have had on a system.

In conclusion, each module in digital investigation and forensics course provided me with the knowledge and skills necessary to investigate cybercrimes, preserve digital evidence, and identify security vulnerabilities . This knowledge is essential for ensuring the integrity of digital evidence and the security of computer systems and networks in an increasingly digital world.

Although, I have finished this module and I learned all of the above, there is always room for improvement for me. I will keep upskilling and learn and grow more in the amazing space of cyber security.

If you find my content helpful, feel free to check my Youtube channel on the following link:

Whiteboard Security YT Channel



Stay safe and I will see you in the next one :)





Comments

Popular posts from this blog

Bluebugging Attack

Fileless Malware Attacks In Cyber Security

What Is Eavesdropping In Cyber Security