Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
Expert
- 10 videos | 34m
- Includes Assessment
- Earns a Badge
This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, a professional certification that allows information system (IS) auditors to properly follow the IS audit process in risk management. You will learn how to identify assets and threats, hardening IT computing environments, performing IT forensics, and auditing tasks. This course explores the importance of gathering, handling, and storing digital evidence to ensure its admissible in a court of law. Because chain-of-custody laws vary around the world, it is important to know how the evidence was gathered, where it was stored, and who had access to the evidence. Learners will explore digital forensics, chain of custody, order of volatility, and hard disk imaging. You will see a list of common digital forensic hardware and software, and IT component collection as evidence. Finally, this course demonstrates how to use tools in Kali Linux, such as the autopsy forensic browser tool to view user data, and how to retrieve data from an image.
WHAT YOU WILL LEARN
-
Discover the subject areas covered in this courseDescribe the purpose of digital forensicsDescribe digital forensic hardwareDescribe digital forensic softwareIdentify which it components should be collected as evidence and the recommended order of collection
-
Recognize the importance of evidence handling and adherence to the chain of custodyUse the kali linux autopsy forensic browser to view user dataUse the kali linux foremost tool to retrieve data from a disk imageAcquire a hard disk image using the linux dd commandDescribe how forensic disk write blockers work, the evidence order of volatility, how to prove evidence integrity, and use linux commands to acquire a disk image
IN THIS COURSE
-
1m 53s
-
3m 28sUpon completion of this video, you will be able to describe the purpose of digital forensics. FREE ACCESS
-
3m 27sAfter completing this video, you will be able to describe digital forensic hardware. FREE ACCESS
-
4m 52sAfter watching this video, you will be able to describe digital forensic software. FREE ACCESS
-
2m 31sDuring this video, you will learn how to identify which IT components should be collected as evidence and the recommended order of collection. FREE ACCESS
-
5m 21sUpon completion of this video, you will be able to recognize the importance of evidence handling and the need to adhere to the chain of custody. FREE ACCESS
-
3m 38sTo find out how to use the Kali Linux Autopsy Forensic Browser to view user data, consult the user manual. FREE ACCESS
-
3m 17sDuring this video, you will learn how to use the Kali Linux Foremost tool to retrieve data from a disk image. FREE ACCESS
-
1m 57sIn this video, you will create a hard disk image using the Linux dd command. FREE ACCESS
-
3m 37sUpon completion of this video, you will be able to describe how forensic disk write blockers work, the evidence order of volatility, how to prove evidence integrity, and use Linux commands to acquire a disk image. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.