If you do well in this course, you will be able to:
- Describe and/or demonstrate how to obtain evidence from a variety of operating systems and applications, including Linux and Windows.
- List common forensics resources and tools.
- Identify and correctly use tools to recover hidden images.
- Demonstrate the ability to correctly use forensic software and tools in lab exercises.
- Describe the basics of email forensics and identify commonly used email forensic tools.
- Identify techniques associated with network forensics and commonly used network forensics tools.
- Describe the basics of incident response procedures and tools.