Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Macquarie University

Digital Forensics

Macquarie University via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Digital Forensics | Investigate. Recover. Protect. In a world where every device leaves a trace, Digital Forensics is the key to uncovering truth in the digital age. Whether solving cybercrimes, responding to insider threats, or tracing malicious activity, this course gives you the practical skills to extract and analyse critical evidence from digital systems. Master the Forensic Mindset Developed by the Cyber Skills Academy at Macquarie University—ranked in the top 1% of universities globally and recognised as Australia’s leading cyber security school—this course has been co-designed with industry experts to ensure you're trained in the exact tools, methods, and mindsets used by professional forensic analysts today. You’ll master the full forensic lifecycle: from identifying and preserving digital evidence to analysing systems and preparing findings that hold up in court. With hands-on application across real-world scenarios, you’ll learn to: • Conduct digital investigations using repeatable, defensible methods. • Recover hidden or deleted files from Windows, Linux, and MacOS file systems. • Use forensic software tools to acquire and validate data from storage devices. • Capture and analyse volatile data from RAM and live network traffic. • Extract evidence from mobile devices and tackle the challenges of IoT forensics. • Navigate legal, ethical, and procedural standards of digital investigations. From Hidden Files to Digital Trails Whether you’re a law enforcement professional, IT analyst, cyber security specialist, or aspiring digital investigator, this course gives you the capability to follow the evidence, uncover the story, and protect what matters. Learn from world leaders. Investigate with confidence. Secure digital truth.

Syllabus

  • Introduction to Digital Forensics Processes
    • Digital forensics is the cornerstone of modern cyber investigations. In this topic, you'll gain a foundational understanding of the digital forensics process—from identifying and preserving digital evidence to analysing it systematically and presenting findings with integrity. You’ll explore the different categories of computer investigations, understand the legal and ethical considerations that shape forensic practices across jurisdictions, and learn how to apply methodical, reproducible techniques to uncover digital truth. Whether responding to corporate breaches or criminal cases, this topic sets the stage for conducting forensic analysis with rigour, responsibility, and precision.
  • Data Acquisitions and Processing Crime and Incident Scenes
    • Effective digital forensics begins with capturing the right data, the right way. This topic explores the critical process of acquiring and preserving digital evidence—whether in the field, on-site, or remotely—while maintaining forensic integrity. You’ll learn how to determine the most appropriate data acquisition methods, develop robust contingency plans, and operate essential forensic tools to validate and safeguard collected evidence. The topic also dives into the techniques used by cybercriminals to hide or obscure data, and how forensic specialists can detect and counteract these evasive strategies. This is where technical precision meets investigative insight.
  • Investigating File Systems (Windows, Linux, MacOS) for Forensic Analysis
    • File systems are rich sources of digital evidence—if you know where to look. In this topic, you'll explore how Windows, Linux, and MacOS file systems store, encrypt, and obscure critical data, and how forensic investigators can extract meaningful insights from them. You’ll examine the structure and functionality of various file systems, delve into Windows Registry analysis to uncover user activity, and learn to navigate challenges like full-disk encryption and password-protected startup environments. From boot sequences to hidden artifacts, this topic equips you with the skills to uncover what lies beneath the surface of digital storage.
  • Computer Forensics Tools for Recovery Files from Storage Media
    • Behind every successful digital investigation is a powerful toolkit. In this topic, you’ll explore the essential software tools used in computer forensics to locate, extract, and recover evidence from various storage media. You’ll learn how to evaluate and validate forensic tools based on reliability, speed, and investigative needs. Special focus is given to graphics file recovery, including strategies for identifying image formats, reconstructing files from raw data, and dealing with fragmented file recovery when metadata is missing or incomplete. This topic will sharpen your ability to choose the right tools and apply them with precision in complex investigations.
  • Live Forensics Investigating RAM and Network Traffic for Evidence
    • When time is critical and data is volatile, live forensics becomes essential. This topic focuses on how to capture real-time evidence from active systems, including RAM, network traffic, and transient processes, before they disappear. You’ll learn how to perform live acquisitions using specialist tools, understand when and how to apply live forensics techniques, and explore the risks, side effects, and legal considerations involved. Additionally, you’ll gain experience with network forensics methodologies—from identifying intrusions and unauthorised access to monitoring network traffic with minimal disruption. This is where digital forensics meets the urgency of live incident response.
  • Cell Phone and Mobile Device Forensics
    • In today’s hyper-connected world, mobile devices hold a wealth of digital evidence—from app activity and location data to communications and network usage. This topic explores the specialised field of mobile forensics, equipping you with the skills to extract, preserve, and analyse data from smartphones, tablets, and IoT devices. You’ll learn industry-standard data acquisition techniques, how to reconstruct a suspect’s activity profile, and the unique challenges posed by modern mobile ecosystems, including encryption, proprietary systems, and distributed data across networks. Whether investigating fraud, cybercrime, or insider threats, this topic prepares you to follow the digital trail through mobile and smart technologies.

Taught by

Matt Bushby

Reviews

Start your review of Digital Forensics

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.