Skip to main contentSkip to Xpert Chatbot

RITx: Computer Forensics

4.5 stars
13 ratings

Learn the process, techniques and tools for performing a digital forensics investigation to obtain data related to computer crimes.

Computer Forensics
8 weeks
10–12 hours per week
Instructor-paced
Instructor-led on a course schedule
Free
Optional upgrade available

There is one session available:

89,785 already enrolled! After a course session ends, it will be archivedOpens in a new tab.
Starts Jan 13, 2025
Ends Mar 12, 2025

About this course

Skip About this course

Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.

In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

At a glance

  • Language: English
  • Video Transcript: English
  • Associated programs:
  • Associated skills:File Systems, Linux, Forensic Sciences, Computer Forensics, Cyber Security, Unix, Microsoft Windows, Digital Forensics

What you'll learn

Skip What you'll learn
  • Court admissibility investigative procedures
  • Attributes of various Windows and Unix/Linux file systems and file recovery processes
  • To identify and apply appropriate forensics tools to acquire, preserve and analyze system image
  • Review and critique a forensics report

Week 1: Digital Forensics Fundamentals Introduction to Incident response digital forensics four-step procedure Concepts: computer/network/Internet forensic and anti-forensics
Week 2: Unix/Linux fundamentals Unix/Linux incident response tools Unix/Linux file systems (Ext2/Ext3)
Week 3: Unix/Linux Forensic Investigation Unix/Linux forensics investigation steps and technologies Unix/Linux forensics case studies
Week 4: Windows Incident Response Memory forensics Windows incident response tools
Week 5: Windows fundamentals Windows file systems Windows forensics tools
Week 6: Windows Forensic Investigation Windows acquisition Windows forensics analysis – registry and other artifacts
Week 7: Advanced artifacts Loadable kernel module rootkits Steganography hiding, detection and analysis
Week 8: Review and Everything Together

More about this course

Skip More about this course
We have included a set of optional and ungraded course activities to allow self-directed learners to gain hands-on experience. To be able to complete these optional and ungraded course activities, you will need to have a system with the following requirements:
  • A 64-bit version of Windows, Mac OSX, or Linux system as your core operating system that can install and run VMware virtualization products.
  • 8 GB of RAM minimum
  • USB port(s)
  • 200+ Gigabyte Host System Hard Drive
  • 50+ Gigabytes of Free Space
  • Have the local administrator access
Please note: The optional activities are a self-directed learning exercise. We cannot troubleshoot each learner's personal configuration.

Who can take this course?

Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

This course is part of Cybersecurity MicroMasters Program

Learn more 
Expert instruction
4 graduate-level courses
Instructor-led
Assignments and exams have specific due dates
8 months
10 - 12 hours per week

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.