Digital Forensic Techniques & Investigative Approaches

Intermediate
  • 14 videos | 57m 40s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 65 users Rating 4.6 of 65 users (65)
In this 14-video course, learners can explore digital forensics best practices and techniques and how they relate to investigations, data integrity, proper evidence handling, and legal privacy considerations. To begin, study an overview of digital forensics, and different types of forensics including computer, mobile, network, vehicle, and the Internet of Things (IoT). Learn how to differentiate between criminal, civil, and intellectual property investigations, and examine a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court. Explore procedures to properly establish and maintain chain of custody; recognize best practices and considerations when working with digital evidence, and examine the roles of forensic laboratories and hardware and software tools. Learn how to recognize legal considerations, including search warrants and privacy considerations; delve into challenges of working with cloud computing environments; and recognize how viruses and other malware work. Learn the importance of ethical decision making related to digital forensic work, and approaches and techniques used when working with live or volatile data. The exercise involves applying digital forensic best practices.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of digital forensics
    Recognize the different types of forensics including computer, mobile, network, vehicle, and iot
    Differentiate between criminal, civil, and intellectual property investigations
    Describe a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court
    Describe the procedure to properly establish and maintain chain of custody
    Recognize best practices and considerations when working with digital evidence
  • Describe the role of forensic laboratories and hardware and software tools
    Recognize legal considerations including search warrants and privacy considerations
    Describe challenges of working with cloud computing environments
    Recognize how viruses and other malware work
    Recognize the importance of ethical decision making related to digital forensic work
    Describe approaches and techniques used when working with live or volatile data, such as confirming if encryption is in use and acquiring system memory
    Use digital forensics best practices and techniques

IN THIS COURSE

  • 2m 37s
  • 3m 40s
    After completing this video, you will be able to provide an overview of digital forensics. FREE ACCESS
  • Locked
    3.  Types of Digital Forensics
    5m 57s
    After completing this video, you will be able to recognize the different types of forensics including computer, mobile, network, vehicle, and IoT forensics. FREE ACCESS
  • Locked
    4.  Investigations
    3m 57s
    In this video, you will learn how to differentiate between criminal, civil, and intellectual property investigations. FREE ACCESS
  • Locked
    5.  Digital Forensic Methodology
    3m
    After completing this video, you will be able to describe a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court. FREE ACCESS
  • Locked
    6.  Chain of Custody
    5m 15s
    After completing this video, you will be able to describe the procedure for properly establishing and maintaining chain of custody. FREE ACCESS
  • Locked
    7.  Evidence Handling
    4m 48s
    Upon completion of this video, you will be able to recognize best practices and considerations when working with digital evidence. FREE ACCESS
  • Locked
    8.  Forensic Laboratories and Tools
    3m 32s
    Upon completion of this video, you will be able to describe the role of forensic laboratories and the hardware and software tools they use. FREE ACCESS
  • Locked
    9.  Legal
    4m 26s
    Upon completion of this video, you will be able to recognize legal considerations, including search warrants and privacy considerations. FREE ACCESS
  • Locked
    10.  Cloud Forensics
    6m 41s
    After completing this video, you will be able to describe the challenges of working with cloud computing environments. FREE ACCESS
  • Locked
    11.  Malware Forensics
    5m 28s
    Upon completion of this video, you will be able to recognize how viruses and other malware work. FREE ACCESS
  • Locked
    12.  Digital Forensics and Ethics
    2m 59s
    After completing this video, you will be able to recognize the importance of ethical decision making related to digital forensics. FREE ACCESS
  • Locked
    13.  Live Forensics
    2m 57s
    After completing this video, you will be able to describe approaches and techniques used when working with live or volatile data, such as confirming if encryption is in use and acquiring system memory. FREE ACCESS
  • Locked
    14.  Exercise: Applying Digital Forensic Best Practices
    2m 25s
    During this video, you will learn how to use digital forensics best practices and techniques. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 37 users Rating 4.3 of 37 users (37)
Rating 4.7 of 242 users Rating 4.7 of 242 users (242)
Rating 4.4 of 94 users Rating 4.4 of 94 users (94)