National CAE Designated Institution
  • Online, Instructor-Led
Course Description

Prerequisite: DFC 620. Utilize tools and techniques in digital forensic investigations involving workstation and mobile platforms. Practice forensic artifact reconstruction and recovery from the file systems of different operating systems, including Windows, Linux, and Macintosh.

Learning Objectives

After completing this course, you should be able to:

  • LG 1: Communication: You can communicate clearly in writing and speaking, meeting expectations for content, purpose, organization, audience, and format.
  • LG 2: Critical Thinking and Analysis: You can apply logical processes to formulate clear, defensible ideas based on the analysis of facts and ethical considerations.
  • LG 3:  Quantitative Reasoning:  You can use mathematical information, operations, and quantitative analyses to solve problems and inform decision-making.
  • LG 4:  Leadership, Facilitation, and Collaboration: You can lead, facilitate, and collaborate with individuals and teams to achieve organizational objectives.
  • LG 5:  Interpret and utilize laws, policies, procedures, and governance in digital forensic and incident response situations.
  • LG 6:  Demonstrate the appropriate use of multiple digital forensic tools and technologies in a variety of criminal and security breach situations including preparing reports and presenting findings.
  • LG 7:  Design and implement strategies for proper seizure, evidence handling, investigation, and analysis of digital artifacts, including preparing reports and presenting findings.
  • LG 8:  Apply proper professional, legal, and ethical frameworks to govern forensic activities in local, national, and global environments.
  • LG 9: Assess an information architecture for potential security threats and evidentiary value.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.