• Post category:StudyBullet-3
  • Reading time:5 mins read


Learn how to protect your business with Computer Forensics Skills

What you will learn

Learn the fundamental process for Computer Forensics

Learn how to understand Cyber Crime and Forensics

Understand the Computer Forensics Planning

Plan your Security Incidents for your Enterprise Business

Description

Learn the fundamentals of Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.

Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted as reliable within U.S. and European court systems.


Get Instant Notification of New Courses on our Telegram channel.


In the early 1980s personal computers became more accessible to consumers, leading to their increased use in criminal activity (for example, to help commit fraud). At the same time, several new “computer crimes” were recognized (such as cracking). The discipline of computer forensics emerged during this time as a method to recover and investigate digital evidence for use in court. Since then computer crime and computer related crime has grown, and has jumped 67% between 2002 and 2003. Today it is used to investigate a wide variety of crime, including child pornography, fraud, espionage, cyberstalking, murder and rape. The discipline also features in civil proceedings as a form of information gathering (for example, Electronic discovery)

Computer forensic investigations usually follow the standard digital forensic process or phases which are acquisition, examination, analysis and reporting. Investigations are performed on static data (i.e. acquired images) rather than “live” systems. This is a change from early forensic practices where a lack of specialist tools led to investigators commonly working on live data.

English
language

Content

Introduction
Introduction
Understanding Computer Forensics
Understanding Computer Forensics
Organizational Security
Organizational Security
Why Computer Forensics?
Why Computer Forensics?
Computer Forensics Planning
Computer Forensics Planning
Types of Computer Crimes
Types of Computer Crimes
Steps for a Forensic Investigation
Steps for a Forensic Investigation