Python Digital Forensics Online Course
About the Course
Python stands out as a versatile and powerful language for conducting cyber investigations and digital forensics analysis. This course is designed to help you harness the capabilities of Python and its popular libraries to carry out effective and thorough forensic investigations across multiple environments.
You’ll begin with network forensics, a crucial component of any investigation. Learn how to capture, sort, and analyze raw network packets to uncover key insights. These foundational skills will pave the way for deeper host-based analysis. You’ll explore essential tools and techniques for performing investigations on both Windows and GNU/Linux systems using Python.
As you progress, the course delves into more advanced topics such as analyzing PE and ELF binaries. You’ll also gain practical skills in memory forensics, learning how to extract and analyze volatile memory to understand what's actively running on a system during an incident.
In the final modules, you'll shift your perspective to think like an attacker—carrying out enumeration, exploitation, and data exfiltration using Python. This offensive insight will enhance your defensive capabilities.
Who should take this Course?
The Python Digital Forensics Online Course is ideal for cybersecurity professionals, digital forensic analysts, law enforcement personnel, and IT investigators who want to leverage Python for automating forensic tasks and analyzing digital evidence. It’s also suitable for students and enthusiasts looking to enter the field of digital forensics. Basic knowledge of Python programming and an understanding of computer systems and file structures are recommended for the best learning experience.
Course Curriculum
Python for Network Forensics
- The Course Overview
- Learning Dshell
- Working with Scapy
- Importing Scapy Modules
- Introduction to Impacket
Windows
- Enumerating Directories
- Populating File Properties
- Querying the Registry
- Exploring Portable Executables
GNU/Linux Forensics
- Enumerating Directories
- Exploring File Properties
- Deeper File Properties
- Parsing System Logs
- Reading the Journal
Memory Forensics
- Analyzing Windows Memory
- Capturing Linux Memory
- Analyzing Linux Memory
Threat Emulation
- Enumeration
- Port Enumeration
- Exploitation
- Post Enumeration
- Data Exfiltration