About the training
In this module students will learn how to identify, collect and preserve digital evidence on different operating systems. They will develop skills to analyse both static and volatile data, required as part of a forensic investigation and how to write a report that can be later used as evidence in court.
In this module students will learn how to identify, collect and preserve digital evidence on different operating systems. They will develop skills to analyse both static and volatile data, required as part of a forensic investigation and how to write a report that can be later used as evidence in court.
What you will learn
LO1 Set up a forensic workstation with the aim of collecting and preserving digital evidence. LO2 Gather and analyze static data from a computer or storage device with the aim of preserving digital evidence. LO3 Acquire and analyze volatile memory and data using tools and data forensics techniques. LO4 Conduct forensic analysis in multiple operating systems and environments. LO5 Write a forensic report complying to international best practice and law. LO6 Analyse the main anti forensic techniques and their impact in conducting a forensic investigation.
LO1 Set up a forensic workstation with the aim of collecting and preserving digital evidence. LO2 Gather and analyze static data from a computer or storage device with the aim of preserving digital evidence. LO3 Acquire and analyze volatile memory and data using tools and data forensics techniques. LO4 Conduct forensic analysis in multiple operating systems and environments. LO5 Write a forensic report complying to international best practice and law. LO6 Analyse the main anti forensic techniques and their impact in conducting a forensic investigation.
Training information
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr. Bahareh Pahlevanzadeh
Requirements: This course is ideal for ICT professionals or graduates with an honours degree in computing or in a cognate area (STEM) who wish to develop a career as a cybersecurity professional in a technical role. This is a highly technical course requiring basic networking knowledge to ensure success. Candidates who do not hold a computing degree and are currently working in the IT sector may be considered based on relevant academic qualifications or extensive work experience.
Course Contact: Dr. Bahareh Pahlevanzadeh