In this 14-video course, learners can explore digital forensics best practices and techniques and how they relate to investigations, data integrity, proper evidence handling, and legal privacy considerations. To begin, study an overview of digital forensics, and different types of forensics including computer, mobile, network, vehicle, and the Internet of Things (IoT). Learn how to differentiate between criminal, civil, and intellectual property investigations, and examine a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court. Explore procedures to properly establish and maintain chain of custody; recognize best practices and considerations when working with digital evidence, and examine the roles of forensic laboratories and hardware and software tools. Learn how to recognize legal considerations, including search warrants and privacy considerations; delve into challenges of working with cloud computing environments; and recognize how viruses and other malware work. Learn the importance of ethical decision making related to digital forensic work, and approaches and techniques used when working with live or volatile data. The exercise involves applying digital forensic best practices.
Digital Forensic Techniques & Investigative Approaches
discover the key concepts covered in this course
provide an overview of digital forensics
recognize the different types of forensics including computer, mobile, network, vehicle, and IoT
differentiate between criminal, civil, and intellectual property investigations
describe a typical methodology or investigative approach, including preservation, collection, examination, analysis, and presentation in court
describe the procedure to properly establish and maintain chain of custody
recognize best practices and considerations when working with digital evidence
describe the role of forensic laboratories and hardware and software tools
recognize legal considerations including search warrants and privacy considerations
describe challenges of working with cloud computing environments
recognize how viruses and other malware work
recognize the importance of ethical decision making related to digital forensic work
describe approaches and techniques used when working with live or volatile data, such as confirming if encryption is in use and acquiring system memory
use digital forensics best practices and techniques