- Type Learning
CyberEd Digital Forensics Warrior
Issued by
CyberEd.io
Digital Forensics Analysts collect, analyze and interpret digital evidence to reconstruct potential criminal events and/or aid in preventing unauthorized actions from threat actors. They help recover data like documents, photos and emails from computer or mobile device hard drives and other data storage devices — such as zip folders and flash drives — that have been deleted, damaged or otherwise manipulated. They carefully follow chain-of-custody rules for digital evidence and provide evidence
- Type Learning
Skills
Earning Criteria
-
EC-Council Certified Incident Handler: This course covers the exam objectives of EC-Council's Certified Incident Handler v2 (E|CIH) program. It discusses the basic skills to handle and respond to security events and addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
-
Digital Forensics Procedures: You're investigating an incident and realize you need to collect forensic evidence. Where do you start? We'll show you!
-
Digital Evidence in Incident Response: How is Digital Forensics Used in the Incident Response Plan. Digital forensics provides the necessary information and evidence that the computer emergency response team (CERT) or computer security incident response team (CSIRT) needs to respond to a security incident.
-
Digital Forensics and NIST: What does NIST have to say about digital forensics? This quick video shows you!
-
Windows Auditing and Forensics: Windows auditing is a mechanism for tracking events. Knowing when and where these events occurred and who triggered them can help when doing Windows network forensics. It can also be very helpful with detecting certain types of problems like improper rights assignments in the file system.