Respond to computer intrusions and attacks using forensics to examine digital media. Upon successful completion of this course, you will be able to conduct a digital forensic examination.
Computer forensics is the performance of a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. With the knowledge gained in this course, you will be able to describe computer forensics, prepare an incident response plan, and implement an initial crime scene investigation. You will also be able to identify forensic tools, preserve evidence, and recognize the chain of custody. As you learn basic concepts about email forensics, memory forensics, and disk forensics through enriched practical labs, you can apply them within your day-to-day security operations. Using practical examples, discussions, and case studies, you will also be able to apply legal considerations to computer forensics.