CISM 2020: Digital Forensics


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Information security managers may be called upon to aid in the gathering and preservation of digital evidence. To achieve certification-level knowledge, you should be savvy in terms of the techniques, requirements, and potential hurdles involved in gathering digital evidence.

In this course, you'll explore several digital forensic techniques, such as order of volatility, chain of custody, and data immutability. You'll also examine common digital forensic hardware and software tools.

To round off the course, you'll gain hands-on experience using steganography, hard disk image creation, and data recovery using Autopsy in Kali Linux. You'll then investigate common web application attacks and secure coding practices.

This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.



Expected Duration (hours)
1.1

Lesson Objectives

CISM 2020: Digital Forensics

  • discover the key concepts covered in this course
  • determine what types of digital evidence should be gathered first
  • outline how to safeguard potential digital evidence from being tampered with
  • recognize how immutability relates to data read-only retention
  • identify the common hardware used for digital forensics
  • identify the common software used for digital forensics
  • hide a message within a graphic image
  • use the Linux dd command to create a disk image
  • view deleted data using a data forensic tool
  • recall the 10 most common web application attacks
  • outline how to apply secure coding best practices to the SDLC (software development life cycle)
  • summarize the key concepts covered in this course
  • Course Number:
    it_spcism2020_11_enus

    Expertise Level
    Intermediate