• Online, Instructor-Led
Course Description

In this course, students examine the role of security policies, standards, and procedures in addressing business and technical risks and develop a security governance report to evaluate compliance across the enterprise.

Learning Objectives

By the end of this course, the student should know or can:

  1. Summarize how to conduct an investigation, including critiquing a case
  2. Describe components used to build a business case for developing a forensics lab
  3. Explain guidelines for seizing digital evidence at the scene
  4. Describe methods for validating and testing digital forensics tools
  5. Describe standard procedures in network forensics and network-monitoring tools
  6. Explain how to approach investigating social media communications

Framework Connections