{
    "id": "cd60ce4a-1b83-48c4-8d38-7e6bfeab4a1e",
    "tags": [
        "Blue Team",
        "Defense",
        "Digital Forensics Professional ",
        "eCDFP",
        "ELS",
        "forensics"
    ],
    "images": {
        "main_image_url": "https://courses.assets.ine.com/courses/images/cd60ce4a-1b83-48c4-8d38-7e6bfeab4a1e/original.jpg",
        "small_image_url": "https://courses.assets.ine.com/fit-in/800x800/courses/images/cd60ce4a-1b83-48c4-8d38-7e6bfeab4a1e/original.jpg",
        "medium_image_url": "https://courses.assets.ine.com/fit-in/1200x1200/courses/images/cd60ce4a-1b83-48c4-8d38-7e6bfeab4a1e/original.jpg",
        "main_image_resize_url_template": "https://courses.assets.ine.com/fit-in/{w}x{h}/courses/images/cd60ce4a-1b83-48c4-8d38-7e6bfeab4a1e/original.jpg"
    },
    "direct_passes": [
        "65637ca1-1b2b-487c-b876-3b484901bcd8",
        "ec55679f-b724-4b92-a689-6880993bef89",
        "8d4ab297-9c35-443c-8ef3-efdd98cd43bc",
        "1f92d62a-53a9-4b4d-b650-46a019b7fdfd",
        "07bf99fe-f021-41a7-a951-0f4f577d7451",
        "55cec27a-6fce-4d9c-a33d-d7cc31a2ac41"
    ],
    "files": [
        {
            "id": "0ee1996b-c0dc-4c7a-b046-04ab7eef98ca",
            "name": "INE Cyber Security Pass - User Guide.pdf",
            "url": "https://assets.ine.com/User-Manuals/INE+Cyber+Security+Pass+-+User+Guide.pdf"
        }
    ],
    "files_uuids": [],
    "related_learning_paths": [
        "54d03ae9-f161-4c34-85d1-ed4007d83f11"
    ],
    "summary": {
        "total_groups": 1,
        "total_videos": 8,
        "total_labs": 11,
        "total_iframes": 2,
        "total_quizzes": 0,
        "total_exercises": 0
    },
    "learning_paths": [
        {
            "id": "54d03ae9-f161-4c34-85d1-ed4007d83f11",
            "name": "Digital Forensics Professional",
            "slug": "digital-forensics-professional"
        }
    ],
    "created": "2020-09-23T17:29:22.732913Z",
    "modified": "2024-04-09T15:03:44.205387Z",
    "status": "published",
    "status_changed": "2020-10-20T15:32:26.594757Z",
    "name": "Digital Forensics: System & Network Forensics",
    "slug": "digital-forensics-system-network-forensics",
    "difficulty": "professional",
    "content": [
        {
            "name": "Course",
            "content": [
                {
                    "name": "Windows Forensics",
                    "content": [
                        {
                            "uuid": "3f6e33de-eee8-4ea5-86d9-46080ec43f8d",
                            "content_type": "iframe"
                        },
                        {
                            "uuid": "2c6b8a4b-237f-4592-8eb4-ff727b0cce92",
                            "content_type": "video"
                        },
                        {
                            "uuid": "c42b4a3c-5ff7-4fd9-b795-3b12d40685b7",
                            "content_type": "video"
                        },
                        {
                            "uuid": "b7b31593-c4c8-4e01-a0e1-11c89a39cb6d",
                            "content_type": "video"
                        },
                        {
                            "uuid": "4f506eaf-4837-4b9b-beb6-6184f81f7f8a",
                            "content_type": "video"
                        },
                        {
                            "uuid": "7e9cf525-b0ff-4b20-a84a-1676f70cd78f",
                            "content_type": "video"
                        },
                        {
                            "uuid": "9bcf926b-9281-4925-9657-2dac122c9f7c",
                            "content_type": "video"
                        },
                        {
                            "uuid": "674ba4a3-d32c-402a-9daa-d4f2e1914560",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "dc2f77c5-d52b-4550-a584-46c1a6670a7d",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "68b767cc-a1b3-4c25-b831-3bedf6a20397",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "af74b04c-80f3-4cf8-ba97-9351a03069db",
                            "content_type": "lab"
                        }
                    ],
                    "content_type": "topic"
                },
                {
                    "name": "Network Forensics",
                    "content": [
                        {
                            "uuid": "ab58c1f8-7e94-4d0a-8854-d75b6134c44c",
                            "content_type": "iframe"
                        },
                        {
                            "uuid": "8c3939ab-3fb7-4f87-9891-13fe62b38915",
                            "content_type": "video"
                        },
                        {
                            "uuid": "0e33ea7b-36a2-4e0f-af6d-a37a52219fc3",
                            "content_type": "video"
                        },
                        {
                            "uuid": "b6022d69-f16d-4f81-a54b-9f56e101b158",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "906b33d1-5647-4898-bc9c-7a2cade72bd4",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "b89a328f-24c3-4e1a-a074-0cc0d72af87d",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "e9205cb4-1d5a-4ac5-8faf-b238764132f4",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "46776acb-56e4-4632-abfe-4bbbf7d49987",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "b3b68fdd-3eca-4ad6-9912-2afde6006d16",
                            "content_type": "lab"
                        },
                        {
                            "uuid": "2fa836f2-5950-4d9f-af9d-b6c4c1465c78",
                            "content_type": "lab"
                        }
                    ],
                    "content_type": "topic"
                }
            ],
            "content_type": "group"
        }
    ],
    "url": "https://my.ine.com/course/digital-forensics-system-network-forensics/cd60ce4a-1b83-48c4-8d38-7e6bfeab4a1e",
    "trailer_jwplayer_id": "",
    "description": "<br>In this course, you will start by analyzing artifacts at the OS level. Specifically, this section dives deeply into the Windows OS and its artifacts. The location of each artifact, the tools needed for their analysis and the knowledge to translate tool results into answers are all documented in this section. You will also dive into to the world of networks in this section. You will start by understanding what network traffic is, what are the main network protocols and how to acquire traffic. Finally, you will get familiar with the tools and techniques required to analyze not only network traffic but different network attack as well.</br>\n\n<br>This course is part of the Digital Forensics Professional Learning path which prepares you for the eCDFP exam and certification</br>",
    "short_description": "",
    "published_date": "2020-10-20T15:32:26.594568Z",
    "auto_publish_at": null,
    "duration_in_seconds": 47347,
    "is_featured": false,
    "has_sample_content": false,
    "has_cc": true,
    "under_construction": false,
    "company": {
        "id": "a491bc32-c056-4946-9169-cc053387bada",
        "name": "INE"
    },
    "vendor": {
        "id": "178dafe4-8894-4f35-a203-4dfbf47db6eb",
        "name": "INE"
    },
    "main_learning_area": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
    "bootcamp_origin": null,
    "categories": [
        {
            "id": "b02cd609-c3d7-4cf8-adb3-582309245126",
            "name": "Blue Team"
        },
        {
            "id": "f0f7fcad-bb64-4f83-a63c-e2dc1b65e144",
            "name": "Digital Forensics"
        }
    ],
    "learning_areas": [
        {
            "id": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
            "name": "Cyber Security"
        }
    ],
    "instructors": [
        {
            "id": "110885e3-0341-4db0-a0a0-dbbc3eab37cf",
            "name": "Ali Hadi",
            "bio": "",
            "certifications": [],
            "profile_img_url": "https://assets.ine.com/instructors/Ali+Hadi.png",
            "twitter_username": ""
        }
    ],
    "skills": [],
    "technologies": [],
    "user_status": {
        "progress": 0.0,
        "total_videos": 8,
        "finished_videos": 0,
        "total_quizzes": 0,
        "finished_quizzes": 0,
        "total_labs": 11,
        "total_links": 0,
        "finished_labs": 0,
        "total_exercises": 0,
        "finished_exercises": 0,
        "total_iframes": 2,
        "finished_iframes": 0,
        "finished_links": 0,
        "is_active": false,
        "prompt_review_50_perc_completion": false,
        "prompt_review_90_perc_completion": false,
        "last_activity_date": null,
        "started_date": null,
        "finished_date": null
    },
    "access": {
        "related_passes": [
            {
                "id": "1f92d62a-53a9-4b4d-b650-46a019b7fdfd",
                "name": "B2B Enterprise"
            },
            {
                "id": "55cec27a-6fce-4d9c-a33d-d7cc31a2ac41",
                "name": "B2B Enterprise + Lab experience"
            },
            {
                "id": "07bf99fe-f021-41a7-a951-0f4f577d7451",
                "name": "B2B Professional"
            },
            {
                "id": "ec55679f-b724-4b92-a689-6880993bef89",
                "name": "B2C Individual"
            },
            {
                "id": "8d4ab297-9c35-443c-8ef3-efdd98cd43bc",
                "name": "B2C Premium"
            },
            {
                "id": "65637ca1-1b2b-487c-b876-3b484901bcd8",
                "name": "Cyber Security"
            }
        ],
        "user_passes": [
            {
                "id": "8d4ab297-9c35-443c-8ef3-efdd98cd43bc",
                "name": "B2C Premium"
            }
        ],
        "has_access": true,
        "available_content_types": [
            "exercise",
            "iframe",
            "lab:azure",
            "lab:els",
            "lab:github",
            "lab:pta",
            "quiz",
            "video"
        ]
    },
    "user_rating": null
}