Incident Response and Digital Forensics – Full Course Syllabus
“Master the Art of Cyber Incident Handling and Digital Evidence Analysis”
Part of the CSRP Bootcamp | Phase 3 – Advanced Cybersecurity
Target Audience: Aspiring cybersecurity analysts, incident responders, and forensic investigators who want to specialize in handling cyber incidents, mitigating threats, and analyzing digital evidence. This course focuses on real-world incident response strategies and hands-on digital forensics techniques.
Course Duration: 18 Lessons (84 Total Hours)
- 12 Instructor-Led Lessons: 4 hours each (48 hours)
- 6 Asynchronous Self-Study Lessons: 6 hours each (36 hours)
- Course Format: Blended Learning (Instructor-Led + Self-Study)
- Outcome: Gain practical skills in incident response planning, threat mitigation, forensic evidence collection, and cybercrime investigation, preparing for advanced cybersecurity roles and certifications (e.g., GCFA, CHFI, CEH).
Course Overview:
The Incident Response and Digital Forensics course prepares students to manage cybersecurity incidents and conduct forensic investigations to uncover the cause of attacks, recover compromised data, and strengthen defenses. Students will explore incident response frameworks, forensic tools, malware analysis, and threat intelligence strategies to handle real-world cyber incidents.
By the end of this course, students will:
✔ Understand the incident response lifecycle (Preparation, Detection, Containment, Eradication, Recovery, Lessons Learned)
✔ Develop and execute incident response plans
✔ Collect, preserve, and analyze digital evidence from compromised systems
✔ Conduct malware analysis, memory forensics, and network forensics
✔ Build the foundation for forensic certifications like GCFA, CHFI, and CEH
Course Objectives:
By the end of this course, students will be able to:
- Manage cyber incidents following industry frameworks (e.g., NIST, SANS)
- Use forensics tools like Autopsy, FTK Imager, Volatility, and Wireshark
- Analyze malware, conduct memory forensics, and trace network intrusions
- Build and implement incident response playbooks
- Conduct post-incident reviews and develop risk mitigation strategies