Macquarie University
Cyber Security: Digital Forensics
Macquarie University

Cyber Security: Digital Forensics

Matt Bushby

位教师:Matt Bushby

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Conduct digital investigations and collect admissible evidence.

  • Analyse file systems, mobile devices, and network activity.

  • Use forensic tools to recover and examine deleted or hidden data.

  • Understand legal, ethical, and procedural standards in forensics.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

June 2025

作业

6 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

积累特定领域的专业知识

本课程是 Cyber Security: Essentials for Forensics 专项课程 专项课程的一部分
在注册此课程时,您还会同时注册此专项课程。
  • 向行业专家学习新概念
  • 获得对主题或工具的基础理解
  • 通过实践项目培养工作相关技能
  • 获得可共享的职业证书

该课程共有6个模块

Digital forensics is the cornerstone of modern cyber investigations. In this topic, you'll gain a foundational understanding of the digital forensics process, from identifying and preserving digital evidence to analysing it systematically and presenting findings with integrity.You’ll explore the different categories of computer investigations, understand the legal and ethical considerations that shape forensic practices across jurisdictions, and learn how to apply methodical, reproducible techniques to uncover digital truth. Whether responding to corporate breaches or criminal cases, this topic sets the stage for conducting forensic analysis with rigour, responsibility, and precision.

涵盖的内容

1个作业7个插件

Effective digital forensics begins with capturing the right data, the right way. This topic explores the critical process of acquiring and preserving digital evidence, whether in the field, on-site, or remotely, while maintaining forensic integrity.You’ll learn how to determine the most appropriate data acquisition methods, develop robust contingency plans, and operate essential forensic tools to validate and safeguard collected evidence. The topic also dives into the techniques used by cybercriminals to hide or obscure data, and how forensic specialists can detect and counteract these evasive strategies. This is where technical precision meets investigative insight.

涵盖的内容

1个作业9个插件

File systems are rich sources of digital evidence, if you know where to look. In this topic, you'll explore how Windows, Linux, and MacOS file systems store, encrypt, and obscure critical data, and how forensic investigators can extract meaningful insights from them.You’ll examine the structure and functionality of various file systems, delve into Windows Registry analysis to uncover user activity, and learn to navigate challenges like full-disk encryption and password-protected startup environments. From boot sequences to hidden artefacts, this topic equips you with the skills to uncover what lies beneath the surface of digital storage.

涵盖的内容

1个作业6个插件

Behind every successful digital investigation is a powerful toolkit. In this topic, you’ll explore the essential software tools used in computer forensics to locate, extract, and recover evidence from various storage media. You’ll learn how to evaluate and validate forensic tools based on reliability, speed, and investigative needs. Special focus is given to graphics file recovery, including strategies for identifying image formats, reconstructing files from raw data, and dealing with fragmented file recovery when metadata is missing or incomplete. This topic will sharpen your ability to choose the right tools and apply them with precision in complex investigations.

涵盖的内容

1个作业5个插件

When time is critical and data is volatile, live forensics becomes essential. This topic focuses on how to capture real-time evidence from active systems, including RAM, network traffic, and transient processes, before they disappear. You’ll learn how to perform live acquisitions using specialist tools, understand when and how to apply live forensics techniques, and explore the risks, side effects, and legal considerations involved. Additionally, you’ll gain experience with network forensics methodologies, from identifying intrusions and unauthorised access to monitoring network traffic with minimal disruption. This is where digital forensics meets the urgency of live incident response.

涵盖的内容

1个作业4个插件

In today’s hyper-connected world, mobile devices hold a wealth of digital evidence, from app activity and location data to communications and network usage. This topic explores the specialised field of mobile forensics, equipping you with the skills to extract, preserve, and analyse data from smartphones, tablets, and IoT devices. You’ll learn industry-standard data acquisition techniques, how to reconstruct a suspect’s activity profile, and the unique challenges posed by modern mobile ecosystems, including encryption, proprietary systems, and distributed data across networks. Whether investigating fraud, cybercrime, or insider threats, this topic prepares you to follow the digital trail through mobile and smart technologies.

涵盖的内容

1篇阅读材料1个作业5个插件

获得职业证书

将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。

位教师

Matt Bushby
Macquarie University
15 门课程7,136 名学生

提供方

从 Computer Security and Networks 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题