Beverly Catalino
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Information security managers may be called upon to aid in the gathering and preservation of digital evidence. To achieve certification-level knowledge, you should be savvy in terms of the techniques, requirements, and potential hurdles involved in gathering digital evidence.
In this course, you'll explore several digital forensic techniques, such as order of volatility, chain of custody, and data immutability. You'll also examine common digital forensic hardware and software tools.
To round off the course, you'll gain hands-on experience using steganography, hard disk image creation, and data recovery using Autopsy in Kali Linux. You'll then investigate common web application attacks and secure coding practices.
This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
Issued on
October 4, 2022
Expires on
Does not expire