• Online, Instructor-Led
  • Online, Self-Paced
Course Description

Star Forensic investigator in Computer Hacking is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. This Course is Specially deign Cyber Crime Officer, Cyber Crime Investigator, legal professionals, professionals work as a cyber security government agencies, IT managers. In This Course You are learn about Investigation Tools, eDiscovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery, Encryption and Decryption methods, Search and Seizure of Computers, Recovering deleted evidences, Password Cracking.

Learning Objectives

  • List and describe the common legal issues related to electronic evidence.
  • Create a document review retention and destruction policy.
  • Demonstrate an understanding of a code of ethics and conduct related to the information security and digital forensics professions.
  • Analyze and critique search warrants, affidavits, and subpoenas.
  • Utilize forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Investigation
  • Cybersecurity Management
  • Digital Forensics
  • Technology R&D

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.