Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering

Expert
  • 10 videos | 34m
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 62 users Rating 4.7 of 62 users (62)
This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, a professional certification that allows information system (IS) auditors to properly follow the IS audit process in risk management. You will learn how to identify assets and threats, hardening IT computing environments, performing IT forensics, and auditing tasks. This course explores the importance of gathering, handling, and storing digital evidence to ensure its admissible in a court of law. Because chain-of-custody laws vary around the world, it is important to know how the evidence was gathered, where it was stored, and who had access to the evidence. Learners will explore digital forensics, chain of custody, order of volatility, and hard disk imaging. You will see a list of common digital forensic hardware and software, and IT component collection as evidence. Finally, this course demonstrates how to use tools in Kali Linux, such as the autopsy forensic browser tool to view user data, and how to retrieve data from an image.

WHAT YOU WILL LEARN

  • Discover the subject areas covered in this course
    Describe the purpose of digital forensics
    Describe digital forensic hardware
    Describe digital forensic software
    Identify which it components should be collected as evidence and the recommended order of collection
  • Recognize the importance of evidence handling and adherence to the chain of custody
    Use the kali linux autopsy forensic browser to view user data
    Use the kali linux foremost tool to retrieve data from a disk image
    Acquire a hard disk image using the linux dd command
    Describe how forensic disk write blockers work, the evidence order of volatility, how to prove evidence integrity, and use linux commands to acquire a disk image

IN THIS COURSE

  • 1m 53s
  • 3m 28s
    Upon completion of this video, you will be able to describe the purpose of digital forensics. FREE ACCESS
  • Locked
    3.  Digital Forensics Hardware
    3m 27s
    After completing this video, you will be able to describe digital forensic hardware. FREE ACCESS
  • Locked
    4.  Digital Forensics Software
    4m 52s
    After watching this video, you will be able to describe digital forensic software. FREE ACCESS
  • Locked
    5.  Order of Volatility
    2m 31s
    During this video, you will learn how to identify which IT components should be collected as evidence and the recommended order of collection. FREE ACCESS
  • Locked
    6.  Chain of Custody
    5m 21s
    Upon completion of this video, you will be able to recognize the importance of evidence handling and the need to adhere to the chain of custody. FREE ACCESS
  • Locked
    7.  Forensic Data Browsing
    3m 38s
    To find out how to use the Kali Linux Autopsy Forensic Browser to view user data, consult the user manual. FREE ACCESS
  • Locked
    8.  Forensic File Recovery
    3m 17s
    During this video, you will learn how to use the Kali Linux Foremost tool to retrieve data from a disk image. FREE ACCESS
  • Locked
    9.  Hard Disk Imaging
    1m 57s
    In this video, you will create a hard disk image using the Linux dd command. FREE ACCESS
  • Locked
    10.  Exercise: Digital Forensic Tools and Techniques
    3m 37s
    Upon completion of this video, you will be able to describe how forensic disk write blockers work, the evidence order of volatility, how to prove evidence integrity, and use Linux commands to acquire a disk image. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.7 of 44 users Rating 4.7 of 44 users (44)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1774 users Rating 4.6 of 1774 users (1774)
Rating 4.4 of 96 users Rating 4.4 of 96 users (96)
Rating 4.7 of 37 users Rating 4.7 of 37 users (37)