CISM 2020: Digital Forensics

placeholder

Information security managers may be called upon to aid in the gathering and preservation of digital evidence. To achieve certification-level knowledge you should be savvy in terms of the techniques requirements and potential hurdles involved in gathering digital evidence.
In this course you;ll explore several digital forensic techniques such as order of volatility chain of custody and data immutability. You;ll also examine common digital forensic hardware and software tools.
To round off the course you;ll gain hands-on experience using steganography hard disk image creation and data recovery using Autopsy in Kali Linux. You;ll then investigate common web application attacks and secure coding practices.
This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.