CISM 2020: Digital Forensics

CISM 2020
  • 12 Videos | 1h 12m 41s
  • Includes Assessment
  • Earns a Badge
Information security managers may be called upon to aid in the gathering and preservation of digital evidence. To achieve certification-level knowledge, you should be savvy in terms of the techniques, requirements, and potential hurdles involved in gathering digital evidence. In this course, you'll explore several digital forensic techniques, such as order of volatility, chain of custody, and data immutability. You'll also examine common digital forensic hardware and software tools. To round off the course, you'll gain hands-on experience using steganography, hard disk image creation, and data recovery using Autopsy in Kali Linux. You'll then investigate common web application attacks and secure coding practices. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    determine what types of digital evidence should be gathered first
    outline how to safeguard potential digital evidence from being tampered with
    recognize how immutability relates to data read-only retention
    identify the common hardware used for digital forensics
    identify the common software used for digital forensics
  • hide a message within a graphic image
    use the Linux dd command to create a disk image
    view deleted data using a data forensic tool
    recall the 10 most common web application attacks
    outline how to apply secure coding best practices to the SDLC (software development life cycle)
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 51s
    UP NEXT
  • Playable
    2. 
    Order of Volatility
    6m 25s
  • Locked
    3. 
    Chain of Custody
    4m 40s
  • Locked
    4. 
    Data Immutability
    6m 28s
  • Locked
    5. 
    Digital Forensic Hardware
    7m 54s
  • Locked
    6. 
    Digital Forensic Software
    5m 11s
  • Locked
    7. 
    Using Steganography
    6m 51s
  • Locked
    8. 
    Acquiring a Hard Disk Image in Linux
    8m 35s
  • Locked
    9. 
    Browsing Data Using Autopsy in Kali Linux
    6m 16s
  • Locked
    10. 
    The OWASP Top 10 Web App Attacks
    5m 46s
  • Locked
    11. 
    Secure Coding and the Software Development Life Cycle (SDLC)
    6m 38s
  • Locked
    12. 
    Course Summary
    1m 7s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE