• Online, Self-Paced
Course Description

Information security managers may be called upon to aid in the gathering and preservation of digital evidence. To achieve certification-level knowledge, you should be savvy in terms of the techniques, requirements, and potential hurdles involved in gathering digital evidence.

In this course, you'll explore several digital forensic techniques, such as order of volatility, chain of custody, and data immutability. You'll also examine common digital forensic hardware and software tools.

To round off the course, you'll gain hands-on experience using steganography, hard disk image creation, and data recovery using Autopsy in Kali Linux. You'll then investigate common web application attacks and secure coding practices.

This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections