Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering

Expert
  • 10 Videos | 38m
  • Includes Assessment
  • Earns a Badge
Likes 29 Likes 29
This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, a professional certification that allows information system (IS) auditors to properly follow the IS audit process in risk management. You will learn how to identify assets and threats, hardening IT computing environments, performing IT forensics, and auditing tasks. This course explores the importance of gathering, handling, and storing digital evidence to ensure its admissible in a court of law. Because chain-of-custody laws vary around the world, it is important to know how the evidence was gathered, where it was stored, and who had access to the evidence. Learners will explore digital forensics, chain of custody, order of volatility, and hard disk imaging. You will see a list of common digital forensic hardware and software, and IT component collection as evidence. Finally, this course demonstrates how to use tools in Kali Linux, such as the autopsy forensic browser tool to view user data, and how to retrieve data from an image.

WHAT YOU WILL LEARN

  • discover the subject areas covered in this course
    describe the purpose of digital forensics
    describe digital forensic hardware
    describe digital forensic software
    identify which IT components should be collected as evidence and the recommended order of collection
  • recognize the importance of evidence handling and adherence to the chain of custody
    use the Kali Linux Autopsy Forensic Browser to view user data
    use the Kali Linux Foremost tool to retrieve data from a disk image
    acquire a hard disk image using the Linux dd command
    describe how forensic disk write blockers work, the evidence order of volatility, how to prove evidence integrity, and use Linux commands to acquire a disk image

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 53s
    UP NEXT
  • Playable
    2. 
    Digital Forensics
    3m 28s
  • Locked
    3. 
    Digital Forensics Hardware
    3m 27s
  • Locked
    4. 
    Digital Forensics Software
    4m 52s
  • Locked
    5. 
    Order of Volatility
    2m 31s
  • Locked
    6. 
    Chain of Custody
    5m 21s
  • Locked
    7. 
    Forensic Data Browsing
    3m 38s
  • Locked
    8. 
    Forensic File Recovery
    3m 17s
  • Locked
    9. 
    Hard Disk Imaging
    1m 57s
  • Locked
    10. 
    Exercise: Digital Forensic Tools and Techniques
    3m 37s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.