Digital Forensic Techniques & Investigative Approaches
Intermediate
- 14 Videos | 57m 40s
- Includes Assessment
- Earns a Badge
In this 14-video course, learners can explore digital forensics best practices and techniques and how they relate to investigations, data integrity, proper evidence handling, and legal privacy considerations. To begin, study an overview of digital forensics, and different types of forensics including computer, mobile, network, vehicle, and the Internet of Things (IoT). Learn how to differentiate between criminal, civil, and intellectual property investigations, and examine a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court. Explore procedures to properly establish and maintain chain of custody; recognize best practices and considerations when working with digital evidence, and examine the roles of forensic laboratories and hardware and software tools. Learn how to recognize legal considerations, including search warrants and privacy considerations; delve into challenges of working with cloud computing environments; and recognize how viruses and other malware work. Learn the importance of ethical decision making related to digital forensic work, and approaches and techniques used when working with live or volatile data. The exercise involves applying digital forensic best practices.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseprovide an overview of digital forensicsrecognize the different types of forensics including computer, mobile, network, vehicle, and IoTdifferentiate between criminal, civil, and intellectual property investigationsdescribe a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in courtdescribe the procedure to properly establish and maintain chain of custodyrecognize best practices and considerations when working with digital evidence
-
describe the role of forensic laboratories and hardware and software toolsrecognize legal considerations including search warrants and privacy considerationsdescribe challenges of working with cloud computing environmentsrecognize how viruses and other malware workrecognize the importance of ethical decision making related to digital forensic workdescribe approaches and techniques used when working with live or volatile data, such as confirming if encryption is in use and acquiring system memoryuse digital forensics best practices and techniques
IN THIS COURSE
-
1.Course Overview2m 37sUP NEXT
-
2.Digital Forensics Concepts3m 40s
-
3.Types of Digital Forensics5m 57s
-
4.Investigations3m 57s
-
5.Digital Forensic Methodology3m
-
6.Chain of Custody5m 15s
-
7.Evidence Handling4m 48s
-
8.Forensic Laboratories and Tools3m 32s
-
9.Legal4m 26s
-
10.Cloud Forensics6m 41s
-
11.Malware Forensics5m 28s
-
12.Digital Forensics and Ethics2m 59s
-
13.Live Forensics2m 57s
-
14.Exercise: Applying Digital Forensic Best Practices2m 25s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.