Respond to computer intrusions and attacks using forensics to examine digital media. Upon successful completion of this course, you will be able to conduct a digital forensic examination.
Computer forensics is the performance of a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. With the knowledge gained in this course, you will be able to describe computer forensics, prepare an incident response plan, and implement an initial crime scene investigation. You will also be able to identify forensic tools, preserve evidence, recognize the chain of custody, and apply concepts in email, memory, and disk forensics within your day-to-day security operations. Using enriched practical labs, discussions, and case studies, you will also be able to apply legal considerations to computer forensics.