SECOPS: Identifying Forensic Evidence
2 Videos | 1h 6m 17s
- Includes Assessment
- Earns a Badge
Examine the importance of being able to identify, handle, and process digital forensic evidence. Learn about computer forensics, chain of custody, and order of volatility, as well as various evidence types. This course can be used as part of the preparation for the 210-255: Implementing Cisco Cybersecurity Operations certification exam.
WHAT YOU WILL LEARN
describe the location of computer forensics dataidentify the stage of order of volatility for DVDslist the chain of custody eventslist the order of volatilitylog who had access to evidence and where it was storeddescribe the different attribution roles
describe the evidence type that is considered circumstantial evidencedescribe the type of evidence that proves a factidentify best evidence within a scenarioidentify the type of evidence that is designed to support a theorylist examples of best evidence
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.