Course details

Digital Forensic Techniques & Investigative Approaches

Digital Forensic Techniques & Investigative Approaches


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 14-video course, learners can explore digital forensics best practices and techniques and how they relate to investigations, data integrity, proper evidence handling, and legal privacy considerations. To begin, study an overview of digital forensics, and different types of forensics including computer, mobile, network, vehicle, and the Internet of Things (IoT). Learn how to differentiate between criminal, civil, and intellectual property investigations, and examine a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court. Explore procedures to properly establish and maintain chain of custody; recognize best practices and considerations when working with digital evidence, and examine the roles of forensic laboratories and hardware and software tools. Learn how to recognize legal considerations, including search warrants and privacy considerations; delve into challenges of working with cloud computing environments; and recognize how viruses and other malware work. Learn the importance of ethical decision making related to digital forensic work, and approaches and techniques used when working with live or volatile data. The exercise involves applying digital forensic best practices.



Expected Duration (hours)
1.0

Lesson Objectives

Digital Forensic Techniques & Investigative Approaches

  • discover the key concepts covered in this course
  • provide an overview of digital forensics
  • recognize the different types of forensics including computer, mobile, network, vehicle, and IoT
  • differentiate between criminal, civil, and intellectual property investigations
  • describe a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court
  • describe the procedure to properly establish and maintain chain of custody
  • recognize best practices and considerations when working with digital evidence
  • describe the role of forensic laboratories and hardware and software tools
  • recognize legal considerations including search warrants and privacy considerations
  • describe challenges of working with cloud computing environments
  • recognize how viruses and other malware work
  • recognize the importance of ethical decision making related to digital forensic work
  • describe approaches and techniques used when working with live or volatile data, such as confirming if encryption is in use and acquiring system memory
  • use digital forensics best practices and techniques
  • Course Number:
    it_sadgfrdj_01_enus

    Expertise Level
    Intermediate