National CAE Designated Institution
  • Online, Instructor-Led
Course Description

In-depth study of system forensics including methodologies used for analysis of computer security breaches. Collect document and evaluate evidence to perform postmortem analysis of a security breach.

Learning Objectives

Identify computer investigation issues; identify legal issues associated with computer investigations; collect document evidence and evaluate evidence; and evaluate network traffic.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Digital Forensics

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.