Education logo

MOOC (Massive Open Online Course) - Computer Forensic

This is a reflection of my lesson in the Massive Open online course called Computer Forensics on Udemy.

By Domingo Añasco-Gaces Samontina, Jr.Published 3 years ago 3 min read
1
MOOC (Massive Open Online Course) - Computer Forensic
Photo by Lewis Keegan - Skillscouter.com on Unsplash

This is a reflection of my lesson in the Massive Open online course called Computer Forensics on Udemy. This reflection is presented in EDUC 205 - Educational Technology.

Course Name Computer: Forensic

MOOC Site: Udemy

Duration: 1.5 hours (8 Lecture)

Start Date: 2-Mar-18

End Date: 2-Mar-18

Education is not dignified on the highest or lowest attainment of a course you have taken. Education is measured on how you comprehend the lesson and applied the learnings using your heart and mind. One cannot say that, if you finish a certain course you consider yourself successful. Nobody perfect, yes! but everything and anything can be learned. It is in the well of the student how he/she manage the knowledge in order to arm them with wide-reaching competence, genuine compassion, and steadfast commitment to society.

A computer is used to present instructions directly to students. Such use is usually termed Computer-Assisted Instruction (CAI), Computer-based instruction (CBI), computer-assisted learning (CAL), and the like.

As a learner and future educator, I understand that integrating technology into the curriculum is the best way to make a positive difference in education.

MOOC or Massive Open Online Course – is a course of study made available over the Internet without charge to a very large number of people. Anyone who decides to take a MOOC simply logs on to the website and signs up then enroll.

I successfully enrolled at Udemy by EHacking Instructor (Ethical Hacking), House of Infosec Professional . Computer forensics experts are required in a professional organization and on Govt level. The objective of this course is to create more professionals. Learn computer forensics from the beginning to the advanced topic. Build a successful career in Computer forensics by understanding the technical and business aspects of forensics. In this course, I learn to acquire disk images, evidence extraction, and evidence management, maintaining the integrity of the data, analyzing the disk in Windows and Linux environments, and many other important topics. The course demonstrates the usage of the most advanced computer forensics tools; you will be using advanced technology while investigating a crime scene.

Course Summary:

Requirements of the Course (*from the site).

  • You should already familiar with the Linux (Kali favorable) and Windows environment.
  • Ideally, you should understand the technical terms, network protocols, however, the same has been discussed in the course.

Content of the Course (*from the site).

  • Understand the process to handle a crime scene
  • Conduct computer forensics analysis to find the evidence
  • Maintain the integrity of the data and will able to perform hashing
  • Learn the process to acquire disk images and the process to analyze disks

Target Learner (*from the site).

  • The computer forensics training course is for everyone who wants to get into the forensics field. Whether you want to get a raise in salary or you want to start a career in Computer forensics, this course is for you.
  • No prior forensics experience is required.

About the Instructor (*from the site):

  • Ehacking is the house of Infosec professionals, we have several years of experience in penetration testing and ethical hacking. The author is a well-known VoIP security engineer with over 5 years of experience, the author has also got many certifications and degrees like Certified Ethical Hacker, RedHat Certified Engineer, CISSP, OSCP, CPE, MBA, and BE.
  • The author has previously published an ebook “Hacking from scratch” and he is also working as a security researcher at Infosec Institute in the US.
  • Many security vulnerabilities have also been found on Google, Dailymotion and etc. by the author and the team ehacking. The group and the author are also listed in Soldierx Hacker Database.

Certification:

Certificate No.: UC-Q3XB5BVW

Certificate url: ude.my/UC-Q3XB5BVW

Like what you read?

Don't forget to please like my story.

Thank you.

courses
1

About the Creator

Domingo Añasco-Gaces Samontina, Jr.

.Professional Member of the Mechatronics and Robotics Society of the Philippines

.Certified Documented Information Controller with TUV Rheinland Qualifications

.Master of Science in Engineering (on-going) with Professional Teacher Certificate

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.