SECOPS: Identifying Forensic Evidence

Cisco SECOPS    |    Intermediate
  • 2 Videos | 1h 6m 17s
  • Includes Assessment
  • Earns a Badge
Likes 8 Likes 8
Examine the importance of being able to identify, handle, and process digital forensic evidence. Learn about computer forensics, chain of custody, and order of volatility, as well as various evidence types. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.

WHAT YOU WILL LEARN

  • describe the location of computer forensics data
    identify the stage of order of volatility for DVDs
    list the chain of custody events
    list the order of volatility
    log who had access to evidence and where it was stored
    describe the different attribution roles
  • describe the evidence type that is considered circumstantial evidence
    describe the type of evidence that proves a fact
    identify best evidence within a scenario
    identify the type of evidence that is designed to support a theory
    list examples of best evidence

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 7 Likes 7  
Likes 6 Likes 6  
Likes 20 Likes 20