Course Desc: A hands-on introduction to the data collection and examination phases associated with digital evidence processing. The objective is to identify data, create and analyze forensic images, and use appropriate tools and techniques to support a cybercrime investigation. Topics include data extraction from computer and file systems, mobile phones, storage media, and electronic documents, securing digital evidence, and root cause analysis.
Learning Objectives
After completing this course, you should be able to:
Create and analyze forensic images and associated artifacts to support a cybercrime investigation
Perform network enumeration to map and identify devices on the network
Use network defense tools to defend against attacks and mitigate vulnerabilities
Compare and contrast cloud-based resources, requirements, and security to evaluate threats and vulnerabilities to cloud-based enterprises
Plan, organize, and conduct penetration testing on a network
Prepare technical summaries of findings in accordance with established reporting procedures
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.