2 days left! Lerne praktische Skills, die du sofort nutzen kannst | Bleib an deinen Zielen fürs erste Quartal dran.
Udemy
Turn what you know into an opportunity and reach millions around the world.
Learn More
Your cart is empty.
Keep shopping
Computer Forensic & Hacking Fundamentals & 1500+ Exam QAs..
Bestseller
Rating: 4.4 out of 5(86 ratings)
1,381 students

Computer Forensic & Hacking Fundamentals & 1500+ Exam QAs..

Foundational Course MCQs::Master the basics of digital forensics cybercrime investigation and evidence analysis..
Last updated 1/2026
English
English [Auto],
This Premium course is included in plans
Current price1.500 ¥
Original Price2.600 ¥
Discount42% off
2 days left at this price!
30-Day Money-Back Guarantee
Full Lifetime Access
Gift this course
  • MT260216JP is applied
  • Udemy coupon
or
Subscribe to Udemy’s top courses
Get this course, plus 29,100+ of our top-rated courses, with Personal Plan. Learn more
Start subscription
Starting at ¥2,292 per month
Cancel anytime

Get your team access to 30,000+ top Udemy courses anytime, anywhere.

  • For teams of 2 or more users
  • 30,000+ fresh & in-demand courses
  • Learning Engagement tools
  • SSO and LMS Integrations
Premium
Access 29,100+ top-rated courses with Udemy Personal Plan.
4.4Rating: 4.4 out of 5
86 ratings
1,381
learners

What you'll learn

  • Computer Forensic
  • Hacking Fundamentals
  • Basics and Fundamentals
  • Sample QAs
  • 1500+ Practice Questions Covering All Exam Topics [264 PDF/TXT Files]

This course includes:

  • 68.5 hours on-demand video
  • 2 practice tests
  • Assignments
  • 84 articles
  • 73 downloadable resources
  • Access on mobile and TV
  • Closed captions
  • Certificate of completion

Course content

9 sections207 lectures75h 7m total length
  • 01 Computer Forensics in Todays World6:12
  • 001_Computer_Forensics_in_Todays_World
  • 02 Fundamentals of Computer Forensics in Computer Hacking6:06
  • 002_Fundamentals_of_Computer_Forensics
  • 03 Understanding Cybercrime and Computer Hacking6:05
  • 003_Types_of_Cybercrimes_and_Examples
  • 04 Digital Evidence Concepts in Computer Hacking6:26
  • 004_Digital_Evidence_Concepts
  • 05 Forensic Readiness in Computer Hacking6:22
  • 005_Forensic_Readiness
  • 06 Roles and Responsibilities of Investigators in Computer Hacking6:13
  • 006_Roles_and_Responsibilities_of_Investigators
  • 07 Computer Forensics Investigation Process in Computer Hacking6:11
  • 007_Computer_Forensics_Investigation_Process
  • 08 Forensic Investigation Phases in Computer Hacking6:21
  • 008_Forensic_Investigation_Phases
  • 09 First Response in Computer Hacking What It Is Why It Matters and What To Do6:19
  • 009_First_Response
  • 10 Pre Investigation in Computer Hacking What It Is Why It Matters6:00
  • 010_Pre-investigation
  • 11 Investigating Computer Hacking What It Is Why It Matters and What We Must Do6:24
  • 011_Investigation
  • 12 Post Investigation Reporting in Computer Hacking6:18
  • 012_Post-investigation_Reporting
  • 13 Understanding Hard Disks and File Systems in Computer Hacking6:18
  • 013_Understanding_Hard_Disks_and_File_Systems
  • 14 Types of Disk Drives and Partitions in Computer Hacking6:28
  • 014_Types_of_Disk_Drives_and_Partitions
  • 15 Understanding Boot Processes and Their Importance in Computer Hacking6:23
  • 015_Boot_Processes_Windows_Linux_macOS
  • 16 Windows Linux Mac File Systems in Computer Hacking6:15
  • 016_Windows_Linux_Mac_File_Systems
  • 17 File System Analysis Tools Autopsy and The Sleuth Kit in Computer Hacking6:08
  • 017_File_System_Analysis_Tools_Autopsy_Sleuth_Kit
  • 18 Data Acquisition and Duplication in Computer Hacking6:20
  • 018_Data_Acquisition_and_Duplication
  • 19 Data Acquisition Fundamentals in Computer Hacking6:00
  • 019_Data_Acquisition_Fundamentals
  • 20 eDiscovery in Computer Hacking What It Is Why It Matters and What We Must Do6:06
  • 020_eDiscovery_Concepts
  • 21 Cyber Forensics6:18
  • 021_Imaging_Methodologies
  • 22 Preparing Image Files for Examination in Computer Hacking Forensics6:18
  • 022_Preparing_Image_Files_for_Examination
  • 23 Defeating Anti Forensics Techniques in Cybersecurity6:16
  • 023_Defeating_Anti-Forensics_Techniques
  • 24 Anti Forensics in Computer Hacking6:10
  • 024_Anti-forensics_Methods
  • 25 Data Deletion and Recycle Bin Forensics in Computer Hacking6:22
  • 025_Data_Deletion_and_Recycle_Bin_Forensics
  • 26 File Carving Techniques in Computer Hacking6:13
  • 026_File_Carving_Techniques
  • 27 Password Cracking and Bypassing6:07
  • 027_Password_Cracking_and_Bypassing
  • 28 Detecting Steganography and Hidden Data in Cyber Hacking6:21
  • 028_Detecting_Steganography_and_Hidden_Data
  • 29 Artifact Wiping and Encryption in Computer Hacking6:28
  • 029_Artifact_Wiping_and_Encryption
  • 30 Program Packers and Minimizing Footprint Techniques in Computer Hacking6:18
  • 030_Program_Packers_and_Minimizing_Footprint_Techniques
  • 31 Windows Forensics in Computer Hacking6:17
  • 031_Windows_Forensics
  • 32 Collecting Volatile and Non Volatile Information in Computer Hacking6:21
  • 032_Collecting_Volatile_and_Non-volatile_Information
  • 33 Memory and Registry Analysis in Computer Hacking6:15
  • 033_Memory_and_Registry_Analysis
  • 34 Web Browser Artifacts What They Are Why They Matter and What To Do6:10
  • 034_Web_Browser_Artifacts_Cache_Cookies_History
  • 35 Windows Files and Metadata in Computer Hacking5:45
  • 035_Windows_Files_and_Metadata
  • 36 ShellBags LNK Files and Jump Lists6:14
  • 036_ShellBags_LNK_Files_Jump_Lists
  • 37 Event Log Analysis in Cybersecurity6:25
  • 037_Event_Logs_Analysis
  • 38 Linux and Mac Forensics in Computer Hacking6:29
  • 038_Linux_and_Mac_Forensics
  • 39 Linux Forensic Collection and File Systems in Computer Hacking6:31
  • 039_Linux_Forensic_Collection_and_File_Systems
  • 40 Mac File System and Memory Forensics in Computer Hacking6:20
  • 040_Mac_File_System_and_Memory_Forensics
  • 41 Log and Shell History Analysis in Computer Hacking6:04
  • 041_Log_and_Shell_History_Analysis
  • 42 Network Forensics in Cybersecurity6:15
  • 042_Network_Forensics
  • 43 Logging Fundamentals and Forensic Readiness6:21
  • 043_Logging_Fundamentals_and_Forensic_Readiness
  • 44 Event Correlation Concepts in Computer Hacking What It Is Why It Matters6:21
  • 044_Event_Correlation_Concepts
  • 45 Indicators of Compromise from Network Logs6:18
  • 045_Indicators_of_Compromise_from_Network_Logs
  • 46 Network Traffic Investigation in Computer Hacking6:18
  • 046_Network_Traffic_Investigation
  • 47 Understanding SIEM Tools and Wireless Attack Monitoring in Cybersecurity6:08
  • 047_SIEM_Tools_and_Wireless_Attack_Monitoring
  • 48 Investigating Web Attacks What It Is Why It Matters and What We Should Do6:26
  • 048_Investigating_Web_Attacks
  • 49 Web Server Logs in Cybersecurity What They Are Why They Matter and What To Do6:15
  • 049_Web_Server_Logs_IIS_Apache
  • 50 IDS and WAF Fundamentals6:38
  • 050_IDS_and_WAF_Fundamentals
  • 51 Detecting Web Attacks SQL Injection XSS and More5:47
  • 051_Detecting_Web_Attacks_SQLi_XSS_etc
  • 52 Dark Web Forensics in Computer Hacking5:38
  • 052_Dark_Web_Forensics
  • 53 Dark Web and Tor Browser Artifacts What They Are and Why They Matter5:38
  • 053_Dark_Web_and_Tor_Browser_Artifacts
  • 54 Database Forensics in Computer Hacking What Why and What to Do5:44
  • 054_Database_Forensics
  • 55 Database Structures and Evidence in Computer Hacking5:28
  • 055_Database_Structures_and_Evidence
  • 56 SQL Server and MySQL Forensics in Computer Hacking5:27
  • 056_SQL_Server_and_MySQL_Forensics
  • 57 Cloud Forensics in Computer Hacking What Why and What to Do5:30
  • 057_Cloud_Forensics
  • 58 Cloud Computing Basics in Computer Hacking What Why and What to Do5:42
  • 058_Cloud_Computing_Basics
  • 60 Forensic Methodologies for Containers and Microservices in Cybersecurity5:34
  • 060_Forensic_Methodologies_for_Containers_and_Microservices
  • 61 Investigating Email Crimes in Computer Hacking5:20
  • 061_Investigating_Email_Crimes
  • 62 Email Structures and Header Analysis in Computer Hacking5:23
  • 062_Email_Structures_and_Header_Analysis
  • 63 Crime Investigation Steps in Computer Hacking5:39
  • 063_Crime_Investigation_Steps

Requirements

  • This Computer Forensic and Hacking Fundamentals course is designed for beginners and does not require prior experience in cybersecurity or digital forensics. However, having a basic understanding of computers, operating systems (Windows/Linux), and networking concepts will be beneficial. Familiarity with common IT tools, such as command-line interfaces and file management systems, can also help learners grasp technical topics more easily. While no formal education in cybersecurity is required, an interest in cybercrime investigation, ethical hacking, or IT security is highly recommended. Learners should have access to a computer with an internet connection to practice hands-on exercises and explore forensic tools. Additionally, critical thinking, problem-solving skills, and attention to detail will enhance the learning experience, as digital forensics involves analyzing data, identifying patterns, and drawing conclusions based on evidence. Whether you are a student, IT professional, law enforcement officer, or cybersecurity enthusiast, this course will provide the necessary foundation to build your expertise in digital forensics and ethical hacking.

Description


In an era where cybercrime is on the rise, the ability to investigate digital incidents and analyze electronic evidence has become a crucial skill. This Computer Forensic and Hacking Fundamentals course is designed to provide a solid foundation in digital forensics, equipping learners with the essential knowledge needed to understand cyber investigations, identify security breaches, and analyze forensic data. Whether you're an aspiring cybersecurity professional, law enforcement officer, or IT specialist, this course will introduce you to the core principles of computer forensics and ethical hacking, helping you develop a deeper understanding of how digital evidence is collected, preserved, and examined.

Cyberattacks and digital crimes are increasing at an alarming rate, affecting individuals, businesses, and government institutions. With cybercriminals employing advanced hacking techniques, organizations require trained professionals who can investigate breaches, trace malicious activities, and recover crucial digital evidence. Computer forensics plays a vital role in uncovering cyber threats, mitigating risks, and ensuring justice in cases involving data breaches, fraud, identity theft, and other cybercrimes. This course empowers learners with hands-on skills and theoretical knowledge to tackle cybersecurity challenges effectively.

Advantages of Learning Computer Forensic and Hacking Fundamentals

  • Understand the Basics of Digital Forensics – Learn how to collect, analyze, and preserve digital evidence legally and ethically.

  • Enhance Cybercrime Investigation Skills – Gain insight into how cybercriminals operate and the techniques used to track them.

  • Improve Ethical Hacking Awareness – Develop foundational knowledge of hacking methods to strengthen cybersecurity defenses.

  • Boost Career Opportunities – Open doors to various career paths, including digital forensic analyst, cybersecurity consultant, or law enforcement investigator.

  • Stay Ahead in the Digital Age – As cyber threats evolve, professionals with forensic and hacking knowledge will remain in high demand.

This course is ideal for students, IT professionals, law enforcement personnel, cybersecurity enthusiasts, and business owners who want to enhance their understanding of digital forensics and cybersecurity. Students looking to build a career in cybersecurity will benefit from the foundational knowledge, while IT professionals can use these skills to strengthen security measures in their organizations. Law enforcement and legal professionals will gain insights into digital evidence handling, and business owners can learn how to protect their organizations from cyber threats.

As technology advances, so do cyber threats. The demand for skilled digital forensic investigators and cybersecurity experts is expected to grow significantly. Organizations are investing heavily in cybersecurity, and professionals with expertise in forensic investigations will be at the forefront of digital crime prevention. Whether you want to pursue a career in cybersecurity or simply gain knowledge to protect yourself and your organization, this course is the first step toward mastering computer forensics and ethical hacking fundamentals.

Join us in this exciting journey and take your first step into the world of cybersecurity and digital forensics!



Who this course is for:

  • This course is ideal for students, IT professionals, law enforcement personnel, cybersecurity enthusiasts, business owners, and anyone interested in digital forensics and ethical hacking. Students and beginners looking to enter the cybersecurity field will gain essential knowledge to build a strong foundation for future career opportunities. IT professionals, including system administrators and network engineers, can enhance their cybersecurity skills to better protect their organizations from cyber threats. Law enforcement officers and legal professionals will benefit from understanding how digital evidence is collected, analyzed, and used in cybercrime investigations. Business owners and executives can use this knowledge to safeguard their company’s digital assets and mitigate risks related to data breaches. With cyberattacks becoming more sophisticated, organizations increasingly seek professionals skilled in forensic investigations and cybersecurity defense. Whether you're aiming for a career in cybersecurity, forensic analysis, or ethical hacking, or simply want to protect your personal and professional data, this course equips you with the fundamental skills to understand, detect, and analyze cyber threats effectively.

Students also bought

  • Premium
  • Rating: 4.4 out of 5
  • 421
  • 22 hours
  • Updated: 8/2025
Current price1.500 ¥
Original Price17.800 ¥
  • Bestseller
  • Rating: 4.6 out of 5
  • 5,883
  • 16.5 hours
  • Updated: 1/2015
Current price1.800 ¥
Original Price23.800 ¥
  • Bestseller
  • Rating: 4.8 out of 5
  • 20
  • 11.5 hours
  • Updated: 4/2025
Current price15.000 ¥
  • Premium
  • Rating: 4.5 out of 5
  • 9,301
  • 1 hour
  • Updated: 11/2017
Current price1.500 ¥
Original Price2.600 ¥
  • Premium
  • Rating: 4.5 out of 5
  • 3,575
  • 1 hour
  • Updated: 7/2022
Current price1.500 ¥
Original Price6.200 ¥
  • Premium
  • Rating: 4.6 out of 5
  • 1,134
  • 11 hours
  • Updated: 7/2025
Current price1.500 ¥
Original Price27.800 ¥
  • Rating: 4.2 out of 5
  • 156
  • 7 hours
  • Updated: 8/2023
Current price1.500 ¥
Original Price2.600 ¥
  • Rating: 4.2 out of 5
  • 52
  • 5 hours
  • Updated: 6/2025
Current price1.500 ¥
Original Price2.600 ¥
  • Premium
  • Rating: 4.7 out of 5
  • 5,757
  • 1.5 hours
  • Updated: 7/2020
Current price1.800 ¥
Original Price8.800 ¥
  • Premium
  • Rating: 4.5 out of 5
  • 517
  • 15.5 hours
  • Updated: 5/2025
Current price1.500 ¥
Original Price27.800 ¥
  • Premium
  • Rating: 4.5 out of 5
  • 1,987
  • 3 hours
  • Updated: 9/2023
Current price1.500 ¥
Original Price4.800 ¥
  • Premium
  • Rating: 4.5 out of 5
  • 50,118
  • 10 hours
  • Updated: 2/2025
Current price1.500 ¥
Original Price2.600 ¥
  • Rating: 4.5 out of 5
  • 2,087
  • 30 mins
  • Updated: 5/2022
Current price1.500 ¥
Original Price2.600 ¥
  • Premium
  • Rating: 4.6 out of 5
  • 1,742
  • 5 hours
  • Updated: 5/2020
Current price1.500 ¥
Original Price19.800 ¥
  • Rating: 4.8 out of 5
  • 1,555
  • 3 hours
  • Updated: 11/2025
Current price1.500 ¥
Original Price27.800 ¥
  • Premium
  • Rating: 4.2 out of 5
  • 5,311
  • 31 mins
  • Updated: 10/2021
Current price1.500 ¥
Original Price2.600 ¥
  • Rating: 4.3 out of 5
  • 473
  • 6.5 hours
  • Updated: 12/2020
Current price1.500 ¥
Original Price26.800 ¥
  • Rating: 4.5 out of 5
  • 2,613
  • 5 hours
  • Updated: 7/2025
Current price1.500 ¥
Original Price11.800 ¥

Häufig zusammen gekauft

Foundational Course MCQs::Master the basics of digital forensics cybercrime investigation and evidence analysis..
InstructorsMana Dowlatshahi Yeganeh
  • Bestseller
  • Rating: 4.4 out of 5
  • 86 ratings
Learn packet analysis with Wireshark, build secure labs in Kali Linux, detect intrusions, and defend against modern hack
InstructorsOCSALY Academy | 560.000+ Students
  • Rating: 4.0 out of 5
  • 626 ratings
From Zero to Hero: Start Your CyberSecurity Career. Start new life changing and highly paid career now.
InstructorsCyberProStudy Ltd., Asen Nikolov
  • Rating: 4.4 out of 5
  • 1,290 ratings
Total:
Current price¥4,500
Original Price¥58,200
Instructor
Mana Dowlatshahi Yeganeh

Mana Dowlatshahi Yeganeh

Mana Dowlatshahi Yeganeh
  • 4.7 Instructor Rating
  • 4,505 Reviews
  • 23,383 Students
  • 135 Courses

Mana Dowlatshahi Yeganeh is a seasoned professional with extensive experience in digital marketing, arts management, and digital transformation strategies. With a creative approach to marketing and communication, Mana has successfully managed innovative campaigns and projects that integrate technology and artistry. Passionate about education and empowerment, Mana is now bringing her expertise to Udemy, offering students practical insights and proven strategies to thrive in the fast-paced world of digital marketing and transformation. Her courses aim to equip learners with the skills and confidence to drive meaningful results and build successful, future-ready careers in the digital age.

4.4 course rating86 ratings

William Holidi

Rating: 5.0 out of 56 days ago

Interesting and engaging course, can't wait to finish it

Edmilson Faria

Rating: 4.5 out of 521 days ago

É um curso com teoria e exercícios, mas poucos laboratórios, mas era o esperado pelas aulas demonstrativas... Atendeu às minhas necessidades, principalmente pela abrangência de conteúdos

Alejandro

Rating: 5.0 out of 528 days ago

Excellent course

Auwal Umar

Rating: 1.0 out of 52 months ago

The course is not inline with the title, its absolute, its AI-Generated 100%, Too much unnecessary contents.

More Courses by Mana Dowlatshahi Yeganeh