Computer Forensics Fundamentals

Computer Forensics Fundamentals

Computer Forensics Fundamentals (C|FF) is an entry-level security program covering the fundamental concepts of information security. Through this program, students can build skills to identify information security threats which reflect on the security posture of the organization and implement general security controls.

This program gives a holistic overview of the key components of computer forensics. It provides a solid fundamental knowledge required for a career in computer forensics.

The Computer Forensics Fundamentals course significantly benefits students interested in learning the fundamentals of computer forensics.

Why C|FF Is Important

It facilitates your entry into the world of computer forensics

It provides a professional understanding of the concepts of computer forensics

It enhances your skills as a Computer Forensics Specialist and increases your employability

Choose a Pricing Option


One - Time Payment!


Enroll with Interest-Free

Monthly Payments

No Credit Checks - 0% Interest - No Application or Registration - No late Fees - Instant Approval - Works with your existing Credit

We have partnered with Splitit to turn your purchase into smaller, bite-sized payments.

Click Here for more information about Splitit, and if you are happy to proceed, send us an email and ask for an Installment Plan.

You will receive a temporary link that will give you a choice to pay with up to 12 months interest-free monthly payments.

After finalising the payment process, you will receive your enrolment confirmation and access information via email with the next steps, within 36 hours or at the specified course's commencement date.

[email protected]

Installments starts from less than $15 / month

The Critical Nature of Computer Forensics

The rapid evolution of computers has brought technical devices as an active weapon to criminals. Cybercriminals have enjoyed the pleasure of being able to combine a large array of complex technologies to be successful in their mission. Due to the complexity of the attack, investigating a crime in the cyber world has become increasingly difficult to do.

Computer forensics is used in different types of investigations like crime and civil investigation, corporate litigation, cybercrime etc. It plays a vital role in the investigation and prosecution of cybercriminals. It refers to a set of methodological procedures and techniques to identify, gather, preserve, extract, interpret, document, and present evidence from computing equipment so that the discovered evidence can be used during a legal and/or administrative proceeding in a court of law.

Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.

Target Audience

The Computer Forensics Fundamentals course is designed for anyone looking to enhance their skills and build a career in information security and computer forensics.

Learning Objectives of the C|FF Program

  • Understanding the key issues plaguing the computer forensics
  • Learn the trademark, copyright, and patents
  • Master the incident handling and response process
  • Master cyber-crime and computer forensics investigation methodology
  • Understand the different types of digital evidence and digital evidence examination process
  • Understand the different types of file systems and their comparison (based on limit and features)
  • Learn to gather volatile and non-volatile information from Windows and network forensics analysis mechanism
  • Understand stenography and its techniques
  • Gain an understanding of the different types of log capturing, time synchronization, and log capturing tools
  • Master the art of e-mail tracking and e-mail crime investigation
  • Learn to write an investigation report

Course Outline

Module 01: Computer Forensics Fundamentals

Module 02: Incident Response and Forensics

Module 03: Digital Evidence

Module 04: Understanding Hard Disks and File Systems

Module 05: Windows Forensics

Module 06: Network Forensics and Investigating Network Traffic

Module 07: Steganography

Module 08: Analyzing Logs

Module 09: E-mail Crime and Computer Forensics

Module 10: Introduction to Writing Investigative Report


Post the completion of attending the complete official course, candidates will receive their Certificate of Attendance.

Choose a Pricing Option


One - Time Payment!


EC-Council has been the world's leading information security certification body since the launch of its flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. Since the launch of CEH, EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security including EC-Council Certified Security Analyst (ECSA), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (CCISO), among others.