This course examines advanced technical aspects of digital computer evidence to include detection, collection, identification, and preservation. Emphasis is placed on specific tools and methods for extracting deleted or destroyed computer-related evidence.
Learning Objectives
Summarize the basic principles of computer forensics.
Summarize important laws regarding computer forensics.
Describe various computer crimes and how they are investigated.
Describe digital forensic methodologies and evidence handling techniques.
Outline the proper approach to collecting, seizing, and protecting evidence.
Explain techniques for hiding and scrambling information as well as how data is recovered.
Summarize various types of digital forensics.
Describe contingency planning and incident response.
Explain how to perform network packet analysis.
Identify technical and legal trends in digital forensics.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.