Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

An Introduction to Digital Forensics

Cyber Mentor via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn the fundamentals of digital forensics in this comprehensive 47-minute video tutorial that explores how digital devices leave behind evidence of user interactions. Discover the foundational principles of forensic science starting with Locard's Exchange Principle and examine a real-world case study of the BTK Killer to understand how digital evidence differs from physical evidence. Master the process of simulating and analyzing forensic artifacts through hands-on demonstrations of file wiping techniques and evidence recovery methods. Explore critical Windows forensic artifacts including registry analysis of "dirty" hives, RunMRU, RecentDocs, Office File MRU, and Trusted Documents to track user activity and file access patterns. Investigate location-based evidence and examine OpenSavePidlMRU and LastVisitedPidlMRU entries to reconstruct user behavior. Analyze LNK files and Windows Prefetch data to understand program execution patterns, then delve into advanced topics including Master File Table (MFT) analysis, USN Journal examination, and Alternate Data Streams (ADS) for comprehensive digital evidence recovery. Gain practical skills in identifying, preserving, and analyzing digital traces left behind by everyday computer usage, providing essential knowledge for cybersecurity professionals, incident responders, and anyone interested in understanding how digital forensics works in modern investigations.

Syllabus

- Introduction
- Locard’s Exchange Principle
- The BTK Killer: A Case Study
- Physical vs Digital Evidence
- Simulating Forensic Artifacts
- Wiping Files
- Analyzing the Evidence
- Last User Login Time
- Analyzing "Dirty" Hives
- RunMRU
- RecentDocs
- Office File MRU
- Trusted Documents
- Reading Location
- OpenSavePidlMRU and LastVisitedPidlMRU
- LNK Files
- Windows Prefetch
- Examining File Wiping Execution
- MFT and USN Journal
- Alternate Data Streams ADS
- USN Journal Analysis
- Conclusion

Taught by

The Cyber Mentor

Reviews

Start your review of An Introduction to Digital Forensics

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.