0% found this document useful (0 votes)
19 views7 pages

CF Act1 Edited

The document outlines a certification course in Cyber Forensics for a student named Akhil Chandran, detailing the evaluation criteria and course descriptions for two specific courses: 'Digital Forensics for Pentesters - Hands-On Learning' and 'Incident Response and Digital Forensics'. Each course emphasizes practical skills in cybersecurity, including evidence collection, malware analysis, and incident response strategies. The document also includes submission details and a grading rubric for the course evaluation.

Uploaded by

akhilhari2110
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views7 pages

CF Act1 Edited

The document outlines a certification course in Cyber Forensics for a student named Akhil Chandran, detailing the evaluation criteria and course descriptions for two specific courses: 'Digital Forensics for Pentesters - Hands-On Learning' and 'Incident Response and Digital Forensics'. Each course emphasizes practical skills in cybersecurity, including evidence collection, malware analysis, and incident response strategies. The document also includes submission details and a grading rubric for the course evaluation.

Uploaded by

akhilhari2110
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

School of Computer Science and Information Technology

Department of CS & IT

VI Semester

SUBJECT CODE: 22BCA6C01


SUBJECT NAME: CYBER FORENSICS

Activity 1
Certification Course’s

Specialization :CTIS

Date of Submission:
Submitted by: Akhil Chandran
Student Name: Akhil Chandran
USN No: 22BCAR0408
Name of Faculty In-Charge: Dr. Sanjeev Kumar Mandal

1
EVALUATION CRITERIA

Report Viva On-Time Creativity & Total Converted


25 M Voce Submission Additional 50M 15 M
10 M 5M Hours Spent
10 M

Introduction - /10
Applications - /5
Certification- /10
Total - /25

This is to certify that AKHIL CHANDRAN has satisfactorily completed the course of
assignment prescribed by Jain Deemed-to-be- University for the Sixth Semester Bachelor in
Computer Applications – CTIS Degree Course in the year 2024-2025.

MARKS

MAX OBTAINED

15

Signature of the Student Signature of the Faculty In-Charge

2
INDEX
Sl. No. Title Page No.

1 Digital Forensics for Pentesters - Hands-On Learning 04

2 Incident Response and Digital Forensics 06

3
REPORT EXPLANATION
Sl. No. 1

Course Name Digital Forensics for Pentesters - Hands-On Learning

Certificate
Attachment

Introduction The "Digital Forensics for Pentesters - Hands-On Learning"


course on Coursera connects penetration testing and digital
forensics, providing cybersecurity experts with important forensic
abilities. Students discover how to gather, maintain, and examine
digital proof using practical tools and methods. The course
includes data recovery, log review, and attack tracing,
emphasizing practical exercises and real-life situations. By
combining forensic methods into pentesting processes, learners

4
acquire the knowledge to identify breaches, reduce weaknesses,
and assist in incident response. This course is perfect for
pentesters and IT experts looking for advanced cybersecurity
abilities.
Application The "Digital Forensics for Pentesters - Hands-On Learning" course
(Simple
is all about giving you practical experience in using digital forensic
techniques within penetration testing and cybersecurity. It’s
explanation) designed to help you understand how to investigate and assess
security breaches effectively.For example, you might work on a
simulated case where you recover deleted files, analyze system
logs, and trace malicious activities. These exercises teach you how
to gather and preserve digital evidence while ensuring it remains
reliable for further analysis or even legal proceedings.The course
dives deep into forensic tools and methods, showing you how to
track the source of cyberattacks, identify system vulnerabilities,
and recommend ways to strengthen defenses. Picture yourself
mapping out the route a hacker took during a penetration test—
these skills directly help organizations improve their security
measures.By blending digital forensics with penetration testing,
this course equips you to handle real-world security incidents,
support incident response teams, and provide actionable advice to
reduce risks. It’s hands-on, insightful, and focused on preparing
you for the challenges of modern cybersecurity.

Course Link https://www.coursera.org/programs/socsit-csit-bca-cloud-technology-and-


information-security-y28v8/learn/packt-digital-forensics-for-pentesters-hands-
on-learning-f4gfm

No. of Hours 9 HOURS

5
REPORT EXPLANATION
Sl. No. 2

Course Name Incident Response and Digital Forensics

Certificate
Attachment

Introduction The "Incident Response and Digital Forensics" course on Coursera is a


great way to learn how to handle cybersecurity incidents and perform
forensic investigations. It’s designed to teach you how to identify,
assess, and respond to security threats effectively.

The course covers key topics like planning for incident response,
collecting evidence, analyzing malware, and reviewing system logs.
With hands-on activities and real-world scenarios, you’ll gain practical
experience in investigating incidents, preserving evidence, and
implementing recovery strategies.

Whether you’re an IT professional or a cybersecurity enthusiast, this


course is perfect for anyone looking to build their skills in managing
security incidents and conducting forensic analysis.

6
Application The "Incident Response and Digital Forensics" course is all about
(Simple
teaching practical skills for managing cybersecurity incidents and
conducting investigations. For example, you might work through a
explanation) mock ransomware attack, where you identify the security breach,
analyze the impacted systems, and recover critical data. Along the
way, you’ll learn how to collect digital evidence, like system logs and
network activity, and ensure it’s securely preserved for legal or
investigative use.

The course also dives into malware analysis, helping you understand
how malware operates and its impact on systems so you can develop
effective solutions. By the end of the course, you’ll be ready to apply
these skills in real-world scenarios—helping organizations respond to
security incidents and prevent future threats.

What sets this course apart is its focus on hands-on learning, giving
you the chance to tackle realistic challenges that mimic the
complexities of actual cybersecurity incidents. You’ll gain valuable
experience in identifying vulnerabilities, tracing attack paths, and
implementing recovery strategies. Whether you're looking to advance
your career in IT security or enhance your expertise in digital
forensics, this course equips you with the tools and knowledge to
make a real impact in safeguarding organizations against evolving
cyber threats.

Course Link https://www.coursera.org/programs/socsit-csit-bca-cloud-technology-


and-information-security-y28v8/learn/ibm-incident-response-digital-
forensics
No. of Hours 6 HOURS

You might also like