Forensic Analysis: Cybercrime Investigations

placeholder

“Cybercrime investigators are typically responsible for collecting processing analyzing and interpreting digital evidence related to network vulnerabilities criminal activity and counterintelligence initiatives.
In this course you ll explore the basics of network packet capturing a process used to intercept and log traffic occurring over a network. You ll also examine the purpose and features of some standard tools and techniques to preserve and analyze a computer system s most volatile data. You ll then learn to use some of these tools and techniques to achieve various digital forensic analysis goals.
Next you ll recognize computer forensic best practices including locating evidence in the Windows Registry. Finally you ll learn how to differentiate between the purpose and features of the various tools avAIlable for conducting hard disk forensic analysis.á”