Course content
Investigation Mindset and Legal-Ethical Guardrails
2Forensic Soundness, Hashing, and Evidence Integrity
3Evidence Intake, Documentation, and Chain of Custody
4Disk, Partition, and File System Essentials for Examinations
5Forensic Imaging Workflows with FTK Imager
6Triage Versus Full Forensics in Incident Response
7Rapid Collection with KAPE and Targeted Artifact Sets
8Windows User Activity Artifacts for Attribution and Timeline Building
9Registry, Event Logs, and Persistence Indicators
10Browser, Download, and Web Account Evidence
11File Execution and Access Traces: Prefetch, LNK, and Jump Lists
12Memory Forensics Basics with Volatility
13Network Traffic Review with Wireshark and Simple Log Analysis
14Mobile Evidence Workflows and Acquisition Limitations
15Android Evidence: Backups, File System Artifacts, and App Data Considerations
16iOS Evidence: Logical Extraction, Backups, and Privacy Constraints
17Cloud and SaaS Evidence Collection from Microsoft 365 and Google Workspace
18Retention, Legal Holds, and Audit Log Preservation in Cloud Investigations
19Scenario Lab: Employee Data Theft Investigation
20Scenario Lab: Phishing Investigation and Account Access Reconstruction
21Scenario Lab: Ransomware Triage and Evidence Preservation
22Scenario Lab: Lost or Stolen Phone Case Handling
23Analysis Workflow in Autopsy and Sleuth Kit
24Timeline Construction, Time Zones, and Time Skew Controls
25Reporting, Findings Validation, and Expert-Ready Writing
26Templates, Checklists, and Repeatable Procedures
27Common Mistakes That Invalidate Evidence and How to Avoid Them
28Glossary, Diagrams, Mini-Quizzes, and Skills Reinforcement Exercises
29Capstone Case: End-to-End Investigation and Complete Forensic Report
Course Description
Digital Forensics for Beginners: Collecting, Preserving, and Analyzing Evidence on Windows, Mobile, and Cloud is a practical ebook course designed for anyone entering cyber security and incident response within Information Technology. It teaches how to approach investigations with the right mindset, follow legal ethical guardrails, and handle digital evidence in a way that stands up to internal review or external scrutiny.
You will learn how forensic soundness guides every step, from evidence intake and documentation to maintaining chain of custody and proving integrity with hashing. The course builds foundational knowledge of disks, partitions, and file systems so you can understand what you are acquiring and why it matters, then moves into proven forensic imaging workflows using FTK Imager and rapid collection methods with KAPE when time sensitive triage is required.
On Windows, you will practice identifying user activity artifacts that support attribution and timeline building, including registry and event log interpretation, persistence indicators, browser and download traces, and file execution and access evidence such as Prefetch, LNK files, and Jump Lists. You will also get an introduction to memory forensics with Volatility, plus network traffic review with Wireshark and simple log analysis to connect endpoint actions with communications and account activity.
Mobile forensics coverage explains realistic acquisition limitations and shows how to work with Android backups, file system artifacts, and app data considerations, alongside iOS logical extraction, backups, and privacy constraints. You will extend your skills to cloud forensics and SaaS evidence collection from Microsoft 365 and Google Workspace, focusing on retention, legal holds, and audit log preservation so cloud investigations remain defensible.
Progressive scenario labs mirror real world cases such as employee data theft, phishing and account access reconstruction, ransomware triage and evidence preservation, and lost or stolen phone handling. You will apply an analysis workflow in Autopsy and Sleuth Kit, build timelines while managing time zones and time skew, and learn reporting, findings validation, and expert ready writing. Templates, checklists, diagrams, mini quizzes, and reinforcement exercises help you avoid common mistakes that invalidate evidence and establish repeatable procedures for consistent results.
Start this course now to build job ready digital forensics skills and learn how to collect, preserve, analyze, and report evidence across endpoints, mobile devices, and cloud services with confidence.
This free course includes:
Audiobook with 00m
29 content pages
Digital certificate of course completion (Free)
Exercises to train your knowledge















