We will contact you shortly.
The acquisition of digital media (such as laptops, hard drives, and USB sticks) is the first step in a cyber forensic case. The acquisition should be conducted in such a way that all the pieces of evidence are reliable enough to be presented in court if necessary.
In this course, we cover every single step of a digital media acquisition, including not only the technical part but also the overall forensic methodology that should be followed.
First, you will be presented with some vital forensic concepts, such as chain of custody.
Next, you will explore all the pre-requisites before the data acquisition.
After, we show through demos how to image the most common digital media types using a professional forensic methodology.
Finally, you will discover how to organize all of the evidence and create work copies for the forensic investigators. All the forensic acquisition task follows strict processes and procedures that ensure that the data will not be tampered with and the evidence is reliable.
Throughout the course, you will follow a real-world scenario in which an employee was selling confidential information to competitors.
By the end of this course, you will be prepared and have the knowledge to be the forensic technician responsible for acquiring the data related to any case.
● Course Overview● Digital Media Acquisition Process● Preparing for the Data Acquisition● Arriving at the Site● Acquiring the Data● Organizing Evidence
This course covers domain one of the CompTIA Security+ certification exam.
In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you'll learn about the various types of threats and attacks every company faces.
First, you'll learn the ins and outs of Malware, ransomware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. Next, you'll also learn the characteristics of the various types of threat actors, the skills they have, and the tools they use. Finally, you'll learn about penetration testing and vulnerability scanning and how they're used to help tighten security and mitigate potential breaches.
By the end of this course, you'll have a solid understanding of the various threats you're likely to face and what tools are available to mitigate these threats.
● Analyzing Indicators of Compromise & Determining Malware Types
● Comparing & Contrasting Attack Types
● Exploring Threat Actor Types and Attributes
● Defining the Penetration Testing Process
● Defining the Vulnerability Scanning Process
● Impacts Associated with Types of Vulnerabilities
Digital forensics investigators are charged with analyzing technology such as computers, smartphones, tablets, and other everyday devices to determine if they have been used to commit a crime, abuse the resources of an organization, or harm other individuals.
In this course, Legal and Ethical Considerations for Digital Forensics, you’ll gain the ability to work with the various types of digital evidence and their admissibility in both a courtroom and a corporate setting.
First, you’ll explore investigator qualifications and ethical responsibilities in presenting evidence that may convict or exonerate a suspect. Next, you’ll discover the challenges of the international cybercrime law. Finally, you’ll learn how to perform an actual investigation in a corporate environment in a case study of corporate abuse.
When you’re finished with this course, you’ll have the skills and knowledge of digital forensics needed to determine the who, what, where, when, how, and why of a technology crime or incident.
● Course Overview
● Understanding Legal and Ethical Aspects of Digital Forensics
● Collecting and Handling Evidence
● Presenting Digital Evidence
● Navigating the US Legal System in Digital Forensics
● Understanding International Issues in Digital Forensics
● Case Study: Litigating a Digital Crime
Want to sign up for the course?
Complete the form to sign up on our website to start your educational journey.
We will contact you shortly.
Can't send form.
Please try again later.