CISA 2022: Digital Evidence Gathering

CISA    |    Expert
  • 10 videos | 54m 58s
  • Includes Assessment
  • Earns a Badge
When conducting an audit, the collection of evidence is imperative in order to properly and completely evaluate an information system. Appropriate care must be taken when gathering, handling, and storing digital evidence so that it remains admissible in a court of law. In this course, you'll explore the principles of digital evidence gathering, beginning with digital forensics, digital forensics hardware, and digital forensics software. Then, you'll dig into order of volatility, chain of custody, and forensic data browsing. Finally, you'll learn about forensic file recovery and hard disk imaging. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the purpose of digital forensics
    Provide an overview of digital forensic hardware
    Provide an overview of digital forensic software
    Identify which it components should be collected as evidence and the recommended order of collection
  • Recognize the importance of evidence handling and adherence to the chain of custody
    Use autopsy to view user data
    Use the kali linux foremost tool to retrieve data from a disk image
    Acquire a hard disk image using the linux dd command
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 7s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 17s
    Upon completion of this video, you will be able to outline the purpose of digital forensics. FREE ACCESS
  • Locked
    3.  Digital Forensics Hardware
    7m 38s
    After completing this video, you will be able to provide an overview of digital forensic hardware. FREE ACCESS
  • Locked
    4.  Digital Forensics Software
    5m 33s
    Upon completion of this video, you will be able to provide an overview of digital forensic software. FREE ACCESS
  • Locked
    5.  Order of Volatility
    6m 16s
    After completing this video, you will be able to identify which IT components should be collected as evidence and the recommended order of collection. FREE ACCESS
  • Locked
    6.  Chain of Custody
    7m 43s
    Upon completion of this video, you will be able to recognize the importance of evidence handling and adherence to the chain of custody. FREE ACCESS
  • Locked
    7.  Browsing for Forensic Data
    11m 29s
    In this video, find out how to use Autopsy to view user data. FREE ACCESS
  • Locked
    8.  Recovering Forensic Files
    4m 46s
    Learn how to use the Kali Linux Foremost tool to retrieve data from a disk image. FREE ACCESS
  • Locked
    9.  Acquiring a Hard Disk Imaging
    4m 19s
    During this video, discover how to acquire a hard disk image using the Linux dd command. FREE ACCESS
  • Locked
    10.  Course Summary
    50s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)