Digital Forensics for Pentesters - Hands-On Learning

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Digital Forensics for Pentesters - Hands-On Learning

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This course provides a guide to digital forensics for penetration testers, featuring hands-on labs and video tutorials. Starting with setting up a forensic lab using VirtualBox, you'll learn to create virtual installations of CSI Linux, Kali Linux, and Windows 10. - You'll master forensic tools like Kali Forensic Mode, Autopsy, and Shodan, gaining hands-on experience in acquiring and analyzing forensic disk images, managing digital forensics cases, and conducting OSINT investigations. - You'll also delve into reverse engineering malware using Ghidra and performing network forensics with Wireshark. - The course culminates in Capture the Flag exercises to apply your skills in real-world scenarios. By the end, you'll have a robust understanding of digital forensics processes, making you a proficient penetration tester. Designed for aspiring and professional penetration testers, cybersecurity analysts, and IT professionals with basic networking and cybersecurity knowledge, this course ensures practical, real-world experience through interactive learning. This course is tailored for technical professionals, cybersecurity enthusiasts, and pentesters seeking to deepen their expertise in digital forensics. Participants should have a foundational understanding of networking and basic Linux operations. Familiarity with virtual environments and command-line interfaces will be beneficial but not mandatory.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Blindly Disabling CSRF — Dynamic CSRF Configuration in Spring Security 6
Learn to dynamically configure CSRF protection in Spring Security 6 for hybrid enterprise APIs, replacing global disable strategies
Medium · Cybersecurity
The OpenAI Breach Wasn't About OpenAI – It Was About the 84 Packages Above Them
The OpenAI breach highlights the importance of securing dependencies in the software supply chain, affecting 84 packages above them
Dev.to · Dimitris Kyrkos
Years of Apple's Best Security Work, Cracked in Five Days — Here's What Developers Should Know
Apple's best security measures were cracked in five days, highlighting the importance of ongoing security efforts for developers
Dev.to · ArshTechPro
TorCT PHP RAT 2026
Learn about TorCT PHP RAT, a stealthy Remote Access Trojan written in PHP that operates without port forwarding, and understand its implications for cybersecurity.
Dev.to AI
Up next
Cryptography
Coursera
Watch →