This course covers the essentials of computer forensic investigations and the evolution of computer forensics. It will explain various modes of attack, examples of cyber crimes, the reasons for cyber attacks, the role of computer forensics in tracking cyber criminals and computer forensics methodologies. The documentation created during this course can be added to the student’s portfolio.
Learning Objectives
1. List, describe, and differentiate between the causation (need) and requirements (guidelines and regulations) for digital forensics.
2. Define and explain the use of technical terms and procedures in computer forensics
3. Describe the fundamentals of a forensic investigation and explain how to preserve the chain of custody
4. Describe the common methods to extract information
5. Identify common tools and activities that are part of a forensic investigation
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.