Premium Course

Computer Forensics Best Practices

Learn the most recommended practices to investigate a computer, that contains evidence in both criminal and civil investigations

Subscribe for Full Access

Get this course and all premium content for as low as $33/month.

Subscribe now

Course Overview

There are five main components to computer forensics these being: identification; collection; preservation; analysis and presentation; of computer forensic evidence and each one of these components is important on its own. The underlying concept in computer forensics is to ensure limited or no handling of the original evidence and to make certain all the steps are followed to satisfy the evidence presented before the court will stand the test of the law.

Each case and each device are different hence there is no one solution to every investigation and an investigator needs to adapt to each given investigation. There are also many automated tools now in operation and though these may extract a plethora of data from a device, it is essential for an investigator to understand how the tools work and how the extracted data is presented. Failure to do so could result in the exclusion of the evidence if it cannot be explained how the data was obtained. 

This course will introduce many of these tools and how and when to use them. If you want to get into the industry and do well and obtain a job in this area or just improve your skillset then this is the course for you.

What You Will Learn

Start Learning for as Little As $8 a Month!

Start Your FREE Two Week Trial

We are working day and night to bring you fresh courses every month. And we have brand new features in the works like guided career paths, hands-on labs and experiences, dedicated mentors, cyber range integration and so much more.

Related Courses

#
Featured Image for Business Continuity And Disaster Recovery Course.

Business Continuity And Disaster Recovery

#
Featured Image for Certified Information Systems Security Professional – CISSP Course.

Certified Information Systems Security Professional – CISSP

« » page 1 / 20

Subscribe & Start Learning

This course is part of our Premium collection of courses. This package is perfect for professionals and teams looking to take their skills to the next level. Gain access to a wide range of sophisticated courses.

Subscribe & Start Learning

Our Basic plan is perfect for students taking their first steps into leadership, IT management, or cybersecurity. Get comfortable. Feel it out. Learn what you love and what you don’t love. Start learning today with a 7 Day Free Trial!