Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Expert
- 10 Videos | 34m
- Includes Assessment
- Earns a Badge
This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, a professional certification that allows information system (IS) auditors to properly follow the IS audit process in risk management. You will learn how to identify assets and threats, hardening IT computing environments, performing IT forensics, and auditing tasks. This course explores the importance of gathering, handling, and storing digital evidence to ensure its admissible in a court of law. Because chain-of-custody laws vary around the world, it is important to know how the evidence was gathered, where it was stored, and who had access to the evidence. Learners will explore digital forensics, chain of custody, order of volatility, and hard disk imaging. You will see a list of common digital forensic hardware and software, and IT component collection as evidence. Finally, this course demonstrates how to use tools in Kali Linux, such as the autopsy forensic browser tool to view user data, and how to retrieve data from an image.
WHAT YOU WILL LEARN
-
discover the subject areas covered in this coursedescribe the purpose of digital forensicsdescribe digital forensic hardwaredescribe digital forensic softwareidentify which IT components should be collected as evidence and the recommended order of collection
-
recognize the importance of evidence handling and adherence to the chain of custodyuse the Kali Linux Autopsy Forensic Browser to view user datause the Kali Linux Foremost tool to retrieve data from a disk imageacquire a hard disk image using the Linux dd commanddescribe how forensic disk write blockers work, the evidence order of volatility, how to prove evidence integrity, and use Linux commands to acquire a disk image
IN THIS COURSE
-
1.Course Overview1m 53sUP NEXT
-
2.Digital Forensics3m 28s
-
3.Digital Forensics Hardware3m 27s
-
4.Digital Forensics Software4m 52s
-
5.Order of Volatility2m 31s
-
6.Chain of Custody5m 21s
-
7.Forensic Data Browsing3m 38s
-
8.Forensic File Recovery3m 17s
-
9.Hard Disk Imaging1m 57s
-
10.Exercise: Digital Forensic Tools and Techniques3m 37s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.