• Online, Self-Paced
Course Description

This course teaches fundamental data collection and analysis techniques used in digital forensic investigations.

Business computers and the data they contain are targets of an increasing number of attacks, which has brought electronic evidence and information gathering to the forefront of incident response. This web-based course is designed for the IT professional who needs to understand the latest techniques and strategies for forensic evidence collection. In three lessons, you will learn tips for controlling a digital forensic investigation and techniques for seizing, collecting, and protecting evidence. The course offers access to online resources including texts, case studies, lectures, and virtual labs that duplicate real-world scenarios. Qualified instructors are available to answer questions about the content and theory.

In the labs for this course, you will work in a virtual environment with a wide range of forensic tools. First, you will run WinAudit, DevManView, and Frhed on sample files to determine if any clandestine threats and vulnerabilities, such as viruses and malicious software, are present. Then you will use Helix, a bootable utility, to identify system state and potential evidence on a running system. You will also run a series forensic tools to extract data from the Internet Explorer browser. These tools include Process Explorer, FavoritesView, IECacheView, IECookiesView, BrowsingHistoryView, and MyLastSearch. Finally, you will use S-Tools, one of many free tools available online, and the Windows Photo Viewer to discover possible steganographic activity on the image files of an evidence drive copy.

Learning Objectives

  • Identify the role of computer forensics in responding to crimes and solving business challenges.
  • Procure evidence in virtualized environments.
  • Examine steganography and encryption techniques for hiding and scrambling information.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Digital Forensics

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.