IM
Most of this course's content would've greatly benefitted from a readable format instead of videos with slideshows. Good introduction nevertheless.

In the Digital Forensics Concepts course, you will learn about legal considerations applicable to computer forensics and how to identify, collect and preserve digital evidence. This course dives into the scientific principles relating to digital forensics and gives you a close look at on-scene triaging, keyword lists, grep, file hashing, report writing and the profession of digital forensic examination.

IM
Most of this course's content would've greatly benefitted from a readable format instead of videos with slideshows. Good introduction nevertheless.
NB
A lot of useful information. I learned a great deal and really enjoyed the course.
CS
Great course! Too bad is not very practical and some thing seems out of order judging by the introduction to each week, but in terms of the actual content it is soooo good!
A
i love this course and its a good explanation and good topic for beginner to advanced.
AM
The course provides a nice introduction. Its eay to understand and follow. I only wish it went more into depth and practical skills
AB
Very well taught. Easy to understand. Good pace as well. Only complaint is that they could make the downloadable files (used to follow along) more accessible.
SP
In this course help gathering knowladage a to z basic concepts of DFC area for my tech careers!
BM
excellent course enjoyed a lot while learning this course. This course has given me a oppurtunity to learn new concepts related to digital forensics
SS
A lot of good core skills for Windows Digital Forensics.
MA
Whole procedure is explained very well. Could've given path to .vmdk files so we could follow through with some demonstrations but otherwise all was well-explained.
AA
Excellent course with very clear explanations by the instructor. Would highly recommend the course for the learner's who are passionate in learning Forensics.
DK
it's good to understands concept about digital forensics
Showing: 20 of 79
Excellent course with very clear explanations by the instructor. Would highly recommend the course for the learner's who are passionate in learning Forensics.
Excellent course that includes the principles of Digital Forensic and a good review of the elements of networks and systems. I really appreciated both the approach to the real environment to be investigated and the purely IT one that is more similar to me.
Whole procedure is explained very well. Could've given path to .vmdk files so we could follow through with some demonstrations but otherwise all was well-explained.
The course documentation had to be obtained in other places. The activities were a little explanatory. The final quiz was focused on networks instead of forensics.
It is a well-written course that is presented by an actual computer forensics expert based on her experience. It provided me with insights to the work of a computer forensic specialist and arming me with the necessary knowledge to prepare me for the career path.
Awesome, really i completed my concepts about this especialization, knew how much love that
The course provides a nice introduction. Its eay to understand and follow. I only wish it went more into depth and practical skills
Strengths: Clear and Detailed Explanation: The breakdown of the expertise judiciaire en informatique is both clear and comprehensive, covering various aspects such as the role of the expert, methodologies, tools, and specific types of expertise in the field. This provides the reader with a well-rounded understanding of the subject. Logical Structure: The transcript is structured in a way that makes it easy for the reader to follow. Each section is clearly delineated, helping guide the reader through the different topics related to forensic computing and digital forensics. Thorough Coverage of Key Concepts: You have addressed a wide range of topics, including risk types, methodology, tools, and responsibilities, which gives the reader an exhaustive view of the field of judicial computing expertise. This kind of coverage is crucial for someone who might be unfamiliar with the topic. Real-Life Examples: The inclusion of real-world examples, such as "piratage informatique" (hacking) and "fraude bancaire en ligne" (online banking fraud), strengthens the explanation and makes it relatable. It helps the reader visualize how these principles apply in practical, real-world scenarios. Areas for Improvement: Clarification of Risk Management Framework: As suggested, incorporating a specific risk management framework would provide a more formal structure to the discussion. For example, you could mention models such as the Risk Identification-Assessment-Mitigation framework, or tools like SWOT analysis, which could help explain how these frameworks relate to managing the risks associated with digital forensics. Use of Terminology Consistency: It’s important to maintain consistency in terminology, especially when discussing critical concepts such as risk mitigation vs. risk management strategies. While both terms are used correctly, defining them clearly and using one term consistently throughout the transcript would avoid potential confusion. Deepening the Legal Aspect: You mentioned the ICJ advisory opinion, which was crucial in Kosovo’s case. It would be beneficial to expand on this section and explain the implications of the legal ruling. For instance, you could discuss how the court's decision influenced international perceptions of Kosovo's independence and how this was a direct strategy to mitigate legal risks. Explaining Risk Management Strategies More Thoroughly: When you refer to "strategic communication and coalition-building," you can provide more details on specific diplomatic strategies employed. Did Ambassador Shabani use direct negotiations with specific countries, or were there broader international summits where he gathered support? Providing these details will make your risk management strategies more tangible and actionable. Linking Risk Management Strategies to Outcomes: After identifying each risk (e.g., geopolitical, legal, or reputational), it would help to directly connect the strategy employed to the outcome achieved. For example, you could explain how Shabani’s engagement in peace-building helped to create a stable diplomatic environment, which ultimately contributed to Kosovo’s recognition by a wider range of countries. Addressing Political Opposition More Directly: While you’ve correctly pointed out geopolitical risks, providing more insight into how Ambassador Shabani specifically managed opposition from countries like Russia and China would be helpful. Did he engage in bilateral talks with these countries? Did he use soft diplomacy tactics to avoid direct confrontation? Adding more details here will clarify how these diplomatic challenges were mitigated. Conclusion Reinforcement: The conclusion ties everything together well, but a stronger reinforcement of how the risk management strategies led to success could make it more impactful. For example, adding a sentence like, “These strategic initiatives, combined with legal victories, ultimately allowed Kosovo to secure greater international legitimacy and stabilize its diplomatic standing” would make the conclusion even stronger. Minor Suggestions: Tone and Language: The tone is formal and professional, but as noted, making it slightly more conversational might improve its readability. For instance, adding direct client-facing phrases like, "Given the current geopolitical landscape, these strategies helped mitigate significant risks," would provide a more engaging tone while maintaining professionalism. Visual Aids: If this is a document that will be presented to a client or an audience, consider adding visuals such as charts, diagrams, or timelines to illustrate key points. For example, a flowchart showing how the legal risks were managed and mitigated through various diplomatic channels would be a powerful addition. Summary: Overall, your transcript offers a strong foundation for understanding the role of risk management in Ambassador Shabani's diplomatic work. By adding more specific examples of risk management frameworks, linking strategies to tangible outcomes, and expanding on certain legal and political aspects, you can elevate the depth and clarity of your analysis. With these refinements, your transcript will not only be more informative but also more persuasive, demonstrating both your expertise and your ability to communicate complex ideas clearly.
This course as described provides basic concepts for any beginners who might be interested in this field. Big concepts explained in a easy, clear and concise manner. Content very well presented.
This course are surely gives you benefit for any beginner to intermediate students. The key of success to accomplish this course is just study harder and harder. Then you will get it
Lectures are very detailed with step by steps procedures to satisfy the court's requirements.Learned a lot of new industry standard programs to capture data for evidence.
excellent course enjoyed a lot while learning this course. This course has given me a oppurtunity to learn new concepts related to digital forensics
I enjoyed the lectures, but most importantly the course was infromative and I have learnt a lot. I am definitely glad I enrolled.
It was short and well made. Everything was compact. The only negative issue is that there was almost no quizzes and assignments.
It was an informative lecture by guiding the general principles of digital forensics and information about networks.
It has been a really good course to understand the concepts of Digital Forensic. Congrats to the author.
In this course help gathering knowladage a to z basic concepts of DFC area for my tech careers!
very informative for those , who actually wants to learn what the computer forensics really is.
i love this course and its a good explanation and good topic for beginner to advanced.
A lot of useful information. I learned a great deal and really enjoyed the course.