Course Overview

Drones are prone to several cyberattacks such as Hijacking, GPS Spoofing, malware, data stealing, MITM, downlink intercept, DoS and more. Malicious actors can use a hacked drone to hack other drones or IoT devices, crash the device, steal sensitive government or enterprise data, spy on government complexes or plants, attack critical infrastructure or civilians or carry out other criminal activities. Thus, it’s vital for forensic analysts, digital forensic investigators, and law enforcement officers to learn how to extract forensically relevant data, such as GPS data, captured or deleted images and videos, drones' flight paths and metadata, from a hacked drone or a drone involved in a criminal activity, in order to aid the investigation of crimes using drones. 

The course will begin with a deep dive into Drones/UAVs/UAS, including a look at the types and components in drones. As you move along, you’ll learn about the common cyberattacks on drones and the criminal activities that involve drones. The course will then provide a thorough introduction to Drone Forensics. Next, you’ll learn about the various tools that can be used for extracting data from Drones. The course will then illustrate how to extract images, videos, and other data from Drone media storage, and how extract drone data from the drone controlling device/software. The course will also demonstrate how to extract evidence by accessing communication ports/channels/network connections. You’ll also learn how to extract deleted data from Drones as well as how to extract GPS, flight parameters, flight path and other metadata. The course will end with a look at how to create an effective forensic report.

By the end of this course, you’ll have the skills to extract forensic evidence from drones for investigating criminal activity. The course offers an advanced topic of digital forensics and provides terms, diagrams, and practice scenarios to sharpen one’s investigative abilities and digital forensics knowledge. 

What You Will Learn

  • Understand about the emerging field of drone forensics
  • Understand about the Open-source and commercial tools
  • technologies and methodologies used in drone forensic investigations
  • Explore reverse engineering to learn the various components of a drone
  • Familiarize with UAV Kill Chain and STRIDE threat models to drone forensic investigations
  • Familiarize with the various tools needed for analysis of drone data and how to perform log analysis of extracted data
  • Perform advanced interpretation and analysis of Drone data
  • and how to preserve extracted evidence

Program Curriculum

  • Actuators and Sensors
  • Hardware Components
  • Software Components
  • Flight Control System
  • Ground Control System
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Actuator and Sensory Storage
  • Hardware Storage
  • Software Storage
  • Flight Control System and Ground Control System Storage
  • Chapter 2 Quiz

  • Commercial Tools
  • Open-source Tools
  • OSINT Tools
  • Chapter 3 Quiz

  • Extracting Data
  • Flight Path Reconstruction for DJI Mini II
  • Flight Path Reconstruction for DJI Spark
  • Flight Path Reconstruction Using DJI Phantom III
  • Chapter 4 Quiz

  • Drone Forensic Investigative Framework
  • INTERPOL Framework for Responding to a Drone Incident
  • Digital Flight Log Examination Framework for Small Drones
  • Chapter 5 Quiz

  • Predator Drone Activity 1
  • Actuator Failure Activity 1
  • Predator Activity 2
  • Chapter 6 Quiz

  • Lack of Standardization of Components
  • Multiple Locations
  • The Inability to Use a Single Forensic Tool
  • Access Restrictions
  • Different File Systems/Future Developments in Drone Forensics
  • Chapter 7 Quiz

  • UAV Kill Chain Framework
  • UAV Kill Chain Threat Scenarios
  • Chapter 8 Quiz
Load more modules

Instructor

Rhonda Johnson

Rhonda Johnson has taught beginning and intermediate college-level courses in Computer Science and is currently a PHD student in Technology Management/Innovation Management with a specialization in Cybersecurity at Northcentral University. Johnson holds Mile2 certifications Certified Digital Forensics Examiner and Certified Penetration Testing Engineer. As the owner of Ogun Drone Forensics Training LLC in Houston, TX, she provides continuing learning courses for IT professionals in the field of Drone Forensics.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8