• Online, Instructor-Led
Course Description

This course provides an introduction to appropriate principles and guidelines that can be used in
information security for information technology auditing. An overview of skills and techniques will be
presented to evaluate potential risks in IT environments. Students will gain the ability to evaluate and
quantify risks to reduce potential IT threats.

Learning Objectives

Demonstrate the ability to secure digital assets using best practices, appropriate laws, and relevant regulations related to digital investigations.
Evaluate situations associated with major computer and network forensics cases and provide insights on possible mitigations to future matters.
Demonstrate the ability to apply knowledge of the management of digital investigations, which may include but is not limited to collection, storage, cataloging evidence for use in prosecution of a digital crime scene.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operations

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.