This course will outline a number of ways to achieve forensic goals, while ensuring all processes are completed in a forensically sound manner. A variety of Windows artifacts, as well as Internet, Chat, and Social Media artifacts will be a part of the classes’ focus.
Additionally, data obfuscation will be discussed as well as how to possibly obtain and analyze various types of data that was intended to be hidden, overwritten, or deleted.
Understand and Implement Forensic Methods
Examine Various Forensic Tools
Creating a Forensically Sound Image of Digital Media
Examining Areas of Forensic Interest
Understanding Encryption and Password Protection
Implementing File Carving
Examining Alternate Data Streams
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.