CISM 2020: Digital Forensics

CISM    |    Intermediate
  • 12 videos | 1h 7m 41s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 33 users Rating 4.7 of 33 users (33)
Information security managers may be called upon to aid in the gathering and preservation of digital evidence. To achieve certification-level knowledge, you should be savvy in terms of the techniques, requirements, and potential hurdles involved in gathering digital evidence. In this course, you'll explore several digital forensic techniques, such as order of volatility, chain of custody, and data immutability. You'll also examine common digital forensic hardware and software tools. To round off the course, you'll gain hands-on experience using steganography, hard disk image creation, and data recovery using Autopsy in Kali Linux. You'll then investigate common web application attacks and secure coding practices. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Determine what types of digital evidence should be gathered first
    Outline how to safeguard potential digital evidence from being tampered with
    Recognize how immutability relates to data read-only retention
    Identify the common hardware used for digital forensics
    Identify the common software used for digital forensics
  • Hide a message within a graphic image
    Use the linux dd command to create a disk image
    View deleted data using a data forensic tool
    Recall the 10 most common web application attacks
    Outline how to apply secure coding best practices to the sdlc (software development life cycle)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 51s
  • 6m 25s
    In this video, learn how to determine what types of digital evidence should be gathered. FREE ACCESS
  • Locked
    3.  Chain of Custody
    4m 40s
    In this video, you will outline how to safeguard potential digital evidence from tampering. FREE ACCESS
  • Locked
    4.  Data Immutability
    6m 28s
    Upon completion of this video, you will be able to recognize how immutability relates to data retention. FREE ACCESS
  • Locked
    5.  Digital Forensic Hardware
    7m 54s
    In this video, you will learn how to identify the common hardware used for digital forensics. FREE ACCESS
  • Locked
    6.  Digital Forensic Software
    5m 11s
    Learn how to identify common software used for digital forensics. FREE ACCESS
  • Locked
    7.  Using Steganography
    6m 51s
    During this video, you will learn how to encode a message within a graphic image. FREE ACCESS
  • Locked
    8.  Acquiring a Hard Disk Image in Linux
    8m 35s
    Learn how to use the Linux dd command to create an image of a disk. FREE ACCESS
  • Locked
    9.  Browsing Data Using Autopsy in Kali Linux
    6m 16s
    Learn how to view deleted data using a data forensic tool. FREE ACCESS
  • Locked
    10.  The OWASP Top 10 Web App Attacks
    5m 46s
    After completing this video, you will be able to recall the 10 most common types of web application attacks. FREE ACCESS
  • Locked
    11.  Secure Coding and the Software Development Life Cycle (SDLC)
    6m 38s
    In this video, you will outline how to apply secure coding best practices to the software development life cycle. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 7s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.3 of 127 users Rating 4.3 of 127 users (127)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 37 users Rating 4.5 of 37 users (37)
Rating 4.3 of 127 users Rating 4.3 of 127 users (127)
Rating 4.6 of 24 users Rating 4.6 of 24 users (24)