• Online, Self-Paced
Course Description

In this course, you'll examine the importance of logs, as well as types of evidence that can be acquired from them. Next, you'll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally, you'll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.

Learning Objectives

{"recognize how data must be acquired from logs to be considered evidence","recognize the use of the different types of evidence","apply examples of evidence to their type of evidence"}

Framework Connections