CISM 2020: Digital Forensics
CISM
| Intermediate
- 12 videos | 1h 7m 41s
- Includes Assessment
- Earns a Badge
Information security managers may be called upon to aid in the gathering and preservation of digital evidence. To achieve certification-level knowledge, you should be savvy in terms of the techniques, requirements, and potential hurdles involved in gathering digital evidence. In this course, you'll explore several digital forensic techniques, such as order of volatility, chain of custody, and data immutability. You'll also examine common digital forensic hardware and software tools. To round off the course, you'll gain hands-on experience using steganography, hard disk image creation, and data recovery using Autopsy in Kali Linux. You'll then investigate common web application attacks and secure coding practices. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDetermine what types of digital evidence should be gathered firstOutline how to safeguard potential digital evidence from being tampered withRecognize how immutability relates to data read-only retentionIdentify the common hardware used for digital forensicsIdentify the common software used for digital forensics
-
Hide a message within a graphic imageUse the linux dd command to create a disk imageView deleted data using a data forensic toolRecall the 10 most common web application attacksOutline how to apply secure coding best practices to the sdlc (software development life cycle)Summarize the key concepts covered in this course
IN THIS COURSE
-
1m 51s
-
6m 25sIn this video, learn how to determine what types of digital evidence should be gathered. FREE ACCESS
-
4m 40sIn this video, you will outline how to safeguard potential digital evidence from tampering. FREE ACCESS
-
6m 28sUpon completion of this video, you will be able to recognize how immutability relates to data retention. FREE ACCESS
-
7m 54sIn this video, you will learn how to identify the common hardware used for digital forensics. FREE ACCESS
-
5m 11sLearn how to identify common software used for digital forensics. FREE ACCESS
-
6m 51sDuring this video, you will learn how to encode a message within a graphic image. FREE ACCESS
-
8m 35sLearn how to use the Linux dd command to create an image of a disk. FREE ACCESS
-
6m 16sLearn how to view deleted data using a data forensic tool. FREE ACCESS
-
5m 46sAfter completing this video, you will be able to recall the 10 most common types of web application attacks. FREE ACCESS
-
6m 38sIn this video, you will outline how to apply secure coding best practices to the software development life cycle. FREE ACCESS
-
1m 7s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.