National CAE Designated Institution
  • Online, Instructor-Led
Course Description

The course introduces principles of digital investigations that are specific to civil litigation. While litigation support services typically utilize many of the same tools, processes, and procedures as public sector criminal investigations, private sector use of computer forensics frequently involves issues that the public sector does not often consider, such as data recovery and restoration, erasure of media, and electronic discovery. Students will examine case studies of public sector digital investigations to compare with private sector methodologies.

Learning Objectives

  • Understand the use of digital forensics and investigation techniques in civil litigation matters.
  • Understand the application of the Federal Rules of Civil Procedure and some of the Sedona Conference Guidelines to civil litigation matters.
  • Understand the overall eDiscovery process.
  • Identify the major issues in cross -border litigation from a digital investigation standpoint.
  • Outline the process for preparing digital evidence for criminal and civil cases.
  • Understand the impact of eDiscovery on public and private sector litigants.
  • Outline the role of expert witnesses and neutral third parties in eDiscovery.
  • Identify the major technical and practical challenges related to eDiscovery.
  • Understand the moral, legal and ethical issues that can arise in civil litigation matters vs. criminal matters.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Knowledge Management
  • Digital Forensics
  • Collection Operations
  • Legal Advice and Advocacy

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.