{
    "id": "d150787c-c042-4e29-86ba-3e6312597ffa",
    "tags": [
        "Blue Team",
        "Digital Forensics",
        "Disk Analysis",
        "File Analysis"
    ],
    "images": {
        "main_image_url": "https://courses.assets.ine.com/courses/images/d150787c-c042-4e29-86ba-3e6312597ffa/original.jpg",
        "small_image_url": "https://courses.assets.ine.com/fit-in/800x800/courses/images/d150787c-c042-4e29-86ba-3e6312597ffa/original.jpg",
        "medium_image_url": "https://courses.assets.ine.com/fit-in/1200x1200/courses/images/d150787c-c042-4e29-86ba-3e6312597ffa/original.jpg",
        "main_image_resize_url_template": "https://courses.assets.ine.com/fit-in/{w}x{h}/courses/images/d150787c-c042-4e29-86ba-3e6312597ffa/original.jpg"
    },
    "direct_passes": [
        "ec55679f-b724-4b92-a689-6880993bef89",
        "8d4ab297-9c35-443c-8ef3-efdd98cd43bc",
        "1f92d62a-53a9-4b4d-b650-46a019b7fdfd",
        "07bf99fe-f021-41a7-a951-0f4f577d7451",
        "65637ca1-1b2b-487c-b876-3b484901bcd8",
        "55cec27a-6fce-4d9c-a33d-d7cc31a2ac41"
    ],
    "files": [],
    "files_uuids": [
        "19973022-33b1-4048-bad4-1870b014da21"
    ],
    "related_learning_paths": [],
    "summary": {
        "total_groups": 4,
        "total_videos": 23,
        "total_labs": 5,
        "total_iframes": 0,
        "total_quizzes": 5,
        "total_exercises": 0
    },
    "learning_paths": [],
    "created": "2020-11-06T14:54:32.093050Z",
    "modified": "2023-11-13T20:13:54.715926Z",
    "status": "published",
    "status_changed": "2022-06-23T15:57:57.483949Z",
    "name": "Digital Forensics: File & Disk Analysis",
    "slug": "digital-forensics-file-disk-analysis",
    "difficulty": "professional",
    "content": [
        {
            "name": "Welcome",
            "content": [
                {
                    "name": "Introduction",
                    "content": [
                        {
                            "uuid": "2e47e29e-7d0f-417c-ba4e-59b67bfe0993",
                            "content_type": "video"
                        }
                    ],
                    "content_type": "topic"
                }
            ],
            "content_type": "group"
        },
        {
            "name": "Persistent Storage Principles",
            "content": [
                {
                    "name": "Overview",
                    "content": [
                        {
                            "uuid": "f09ea9cf-29c8-4a5c-b1c5-172468edbda2",
                            "content_type": "video"
                        }
                    ],
                    "content_type": "topic"
                },
                {
                    "name": "Technology",
                    "content": [
                        {
                            "uuid": "47c68334-b3d3-405b-9841-cea39b34a001",
                            "content_type": "video"
                        },
                        {
                            "uuid": "1f402a0e-30ab-4407-9786-df3c3f0f81fb",
                            "content_type": "quiz"
                        },
                        {
                            "uuid": "2f1a2d2b-15fa-4f3b-941c-04fefdc6440b",
                            "content_type": "video"
                        },
                        {
                            "uuid": "b6e777bd-5c1e-4e7f-a531-5520c0a672a1",
                            "content_type": "quiz"
                        }
                    ],
                    "content_type": "topic"
                },
                {
                    "name": "Partitions",
                    "content": [
                        {
                            "uuid": "be4e25a3-bf17-462b-b4e9-a6093d6b804f",
                            "content_type": "video"
                        },
                        {
                            "uuid": "4e645ea3-9dbe-4d41-8087-849a23d6c647",
                            "content_type": "video"
                        },
                        {
                            "uuid": "fbeeccc4-54dd-4c12-b667-4f5bfc12515d",
                            "content_type": "quiz"
                        }
                    ],
                    "content_type": "topic"
                },
                {
                    "name": "Review",
                    "content": [
                        {
                            "uuid": "e4dd15a4-eea0-4752-9b7e-a482cb64d0e7",
                            "content_type": "video"
                        }
                    ],
                    "content_type": "topic"
                }
            ],
            "content_type": "group"
        },
        {
            "name": "Fundamentals of File Systems",
            "content": [
                {
                    "name": "Overview",
                    "content": [
                        {
                            "uuid": "a051346a-c7cb-4eaa-9824-5187ecfa8bf2",
                            "content_type": "video"
                        }
                    ],
                    "content_type": "topic"
                },
                {
                    "name": "File Systems",
                    "content": [
                        {
                            "uuid": "ecd3f61f-d1ca-4929-954e-ed74b5772a1d",
                            "content_type": "video"
                        },
                        {
                            "uuid": "de166ac1-9c2f-44e0-bb40-ed830e72008d",
                            "content_type": "video"
                        },
                        {
                            "uuid": "f30ba3ed-277c-4cff-8575-df3e11e8f641",
                            "content_type": "video"
                        },
                        {
                            "uuid": "d723ace2-c860-4e86-9b26-da9ff679deb5",
                            "content_type": "quiz"
                        },
                        {
                            "uuid": "28b1174e-7934-48e6-b97c-b2b1ba99bffc",
                            "content_type": "video"
                        }
                    ],
                    "content_type": "topic"
                },
                {
                    "name": "File Carving",
                    "content": [
                        {
                            "uuid": "594121b5-caba-41b7-94c7-0ab47890f307",
                            "content_type": "video"
                        },
                        {
                            "uuid": "a5647f86-770c-40d8-b814-73a21256733a",
                            "content_type": "video"
                        },
                        {
                            "uuid": "2bc1ee12-b684-320e-abe8-0ed915048aec",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "0de8f6a7-52c0-4953-960c-d77ced1feec0",
                            "content_type": "video"
                        },
                        {
                            "uuid": "9dc99760-5ce7-384c-bdb8-4f544300bab5",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "1547a48b-1238-49b0-81c4-a49c505eac3d",
                            "content_type": "video"
                        },
                        {
                            "uuid": "f658c2db-de9f-3462-9209-cdacb4e6612a",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "7a2d0f9e-f3b2-4a73-9ce9-55df0719fffd",
                            "content_type": "video"
                        },
                        {
                            "uuid": "e6cc06d0-3ce7-35e6-aae9-bfbcce7481a2",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "877de429-fbfe-4f9e-96f5-132a47b4504c",
                            "content_type": "video"
                        },
                        {
                            "uuid": "600fb5a2-2072-4a88-9963-2f357340c4b8",
                            "content_type": "video"
                        },
                        {
                            "uuid": "5aec83e7-83b3-4e35-ae56-3a7ce236d49e",
                            "content_type": "quiz"
                        },
                        {
                            "uuid": "c55438ad-37a5-4f8c-afef-e002e23be8b2",
                            "content_type": "video"
                        },
                        {
                            "uuid": "93c087aa-4ced-431b-b1e1-a9b99607095b",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "dcd52b3a-750e-484a-a4fd-40b40edb6b98",
                            "content_type": "video"
                        }
                    ],
                    "content_type": "topic"
                },
                {
                    "name": "Review",
                    "content": [
                        {
                            "uuid": "88a1d399-5e33-44d7-9321-83f234a7bc89",
                            "content_type": "video"
                        }
                    ],
                    "content_type": "topic"
                }
            ],
            "content_type": "group"
        },
        {
            "name": "Goodbye",
            "content": [
                {
                    "name": "Conclusion",
                    "content": [
                        {
                            "uuid": "739764b1-1f2d-4366-acd7-8e67698f15d9",
                            "content_type": "video"
                        }
                    ],
                    "content_type": "topic"
                }
            ],
            "content_type": "group"
        }
    ],
    "url": "",
    "trailer_jwplayer_id": "bHtfkwY4",
    "description": "In this course, you will learn the basics about interacting with the lower levels of files and disks. We will cover the involved technology and foundational disk concepts. You will understand the file system structures and how to forensically identify different file types regardless of operating or file system type. You will then get familiar with disk drives, their types, and schemes used today by our systems. We will introduce you to volumes and partitions. You will learn what they are, how to identify them, and the techniques you can use to analyze them. Finally, you will dive into the world of file systems. You will be shown how to apply file carving techniques to retrieve previously removed data. This course is part of the Digital Forensics Professional Learning path which prepares you for the eCDFP exam and certification.",
    "short_description": "",
    "published_date": "2022-06-23T15:57:57.465803Z",
    "auto_publish_at": null,
    "duration_in_seconds": 20948,
    "is_featured": false,
    "has_sample_content": false,
    "has_cc": true,
    "under_construction": false,
    "company": {
        "id": "a491bc32-c056-4946-9169-cc053387bada",
        "name": "INE"
    },
    "vendor": {
        "id": "178dafe4-8894-4f35-a203-4dfbf47db6eb",
        "name": "INE"
    },
    "main_learning_area": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
    "bootcamp_origin": null,
    "categories": [
        {
            "id": "b02cd609-c3d7-4cf8-adb3-582309245126",
            "name": "Blue Team"
        },
        {
            "id": "9c69b3db-640b-4476-88c1-150cadc6d573",
            "name": "Cyber Forensics Mgmt"
        }
    ],
    "learning_areas": [
        {
            "id": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
            "name": "Cyber Security"
        }
    ],
    "instructors": [
        {
            "id": "1923e328-1bcb-4999-bddb-ef9e1c5a03a7",
            "name": "Jason Alvarado",
            "bio": "Jason began his cyber security career more than two decades ago when he accepted a position as a systems administrator. Over the course of the next 20 years, he held a variety of roles including network administrator, systems engineer, senior security operations specialist, senior DFIR consultant, and more. A constant throughout his career has been his belief in sharing knowledge and creating opportunities for cyber security professionals. One way he lived by this philosophy was by working as a Cyber Security Lead Faculty and Program Coordinator where he taught nearly one dozen degree and certificate programs. Jason is a GIAC Certified Forensic Analyst and an active member of the Dallas Hackers Association, North Texas ISSA, FBI Infragard, and North Texas Cyber Security Group. In addition to his passion for all things cyber security, he is an award-winning homebrewer, an active volunteer, and a gamer! You may contact Jason at jalvarado@ine.com.",
            "certifications": [],
            "profile_img_url": "https://assets.ine.com/instructors/ine-jason-alvarado-final.jpg",
            "twitter_username": ""
        }
    ],
    "skills": [],
    "technologies": [],
    "user_status": {
        "progress": 0.0,
        "total_videos": 23,
        "finished_videos": 0,
        "total_quizzes": 5,
        "finished_quizzes": 0,
        "total_labs": 5,
        "total_links": 0,
        "finished_labs": 0,
        "total_exercises": 0,
        "finished_exercises": 0,
        "total_iframes": 0,
        "finished_iframes": 0,
        "finished_links": 0,
        "is_active": false,
        "prompt_review_50_perc_completion": false,
        "prompt_review_90_perc_completion": false,
        "last_activity_date": null,
        "started_date": null,
        "finished_date": null
    },
    "access": {
        "related_passes": [
            {
                "id": "1f92d62a-53a9-4b4d-b650-46a019b7fdfd",
                "name": "B2B Enterprise"
            },
            {
                "id": "55cec27a-6fce-4d9c-a33d-d7cc31a2ac41",
                "name": "B2B Enterprise + Lab experience"
            },
            {
                "id": "07bf99fe-f021-41a7-a951-0f4f577d7451",
                "name": "B2B Professional"
            },
            {
                "id": "ec55679f-b724-4b92-a689-6880993bef89",
                "name": "B2C Individual"
            },
            {
                "id": "8d4ab297-9c35-443c-8ef3-efdd98cd43bc",
                "name": "B2C Premium"
            },
            {
                "id": "65637ca1-1b2b-487c-b876-3b484901bcd8",
                "name": "Cyber Security"
            }
        ],
        "user_passes": [
            {
                "id": "8d4ab297-9c35-443c-8ef3-efdd98cd43bc",
                "name": "B2C Premium"
            }
        ],
        "has_access": true,
        "available_content_types": [
            "exercise",
            "iframe",
            "lab:azure",
            "lab:els",
            "lab:github",
            "lab:pta",
            "quiz",
            "video"
        ]
    },
    "user_rating": null
}