Digital Forensics: Evidence Preservation and Extraction Advanced Concealment ...
This course will be an overview of: Evidence-preservation fundamentals, including scene security, cloud holds, and the order of volatility, ensuring data integrity before acquisition Acquisition methodologies such as bit-level imaging, RAM capture, and targeted disk extraction, with emphasis on validated tools and cryptographic verification Post-acquisition workflows—artifact recovery, deep-dive analysis, and compliance documentation—to translate raw data into courtroom-ready findings Advanced concealment challenges, covering steganography and encryption detection techniques, and the legal considerations that govern their investigative use
This course will be an overview of: Evidence-preservation fundamentals, including scene security, cloud holds, and the order of volatility, ensuring data integrity before acquisition Acquisition methodologies such as bit-level imaging, RAM capture, and targeted disk extraction, with emphasis on validated tools and cryptographic verification Post-acquisition workflows—artifact recovery, deep-dive analysis, and compliance documentation—to translate raw data into courtroom-ready findings Advanced concealment challenges, covering steganography and encryption detection techniques, and the legal considerations that govern their investigative use
Field of study:
Information TechnologyInstructor(s):