Course Course Summary Section 1 Content Section 1 Content Left Section 1 Content Right Credit Type: Course ACE ID: LDRQ-0004 Organization: ACI Learning Location: Classroom-based Length: 40 hours for 1 week (day classes); 20 hours for 2 weeks (evening classes) Dates Offered: 11/1/2017 - 12/31/2020 Credit Recommendation & Competencies Section 2 Content Section 2 Content Left Section 2 Content Right Level Credits (SH) Subject Vocational-Certificate 2 Digital Forensics Description Section 3 Content Section 3 Content Left Section 3 Content Right Objective: The course objective is to present a detailed methodological approach to computer forensics and evidence analysis. Learning Outcomes: Have a basic understanding of the computer forensic investigation process and the potential legal issues involved Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene Data acquisition and duplication rules, validation methods and tools required The process involved in forensic investigation using Access Data FTK and EnCase Password Cracking Concepts, tools, types of password attacks and how to investigate password protected files Importance of the investigation of logs, network traffic, wireless attacks, and web attacks Importance of the tracking of e-mails and investigate e-mail crimes Mobile forensics and mobile forensics software and hardware tools Importance of the writing investigative reports Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category Various file systems and how to boot a disk Gathering volatile and nonvolatile information from Windows How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux Steganography and its techniques, steganalysis, and image file forensics Different types of log capturing, log management, time synchronization and log capturing tools General Topics: Treatment of digital evidence, investigation techniques, and digital forensic investigation Instruction & Assessment Section 4 Content Section 4 Content Left Section 4 Content Right Instructional Strategies: Classroom Exercise Discussion Lectures Methods of Assessment: Examinations Minimum Passing Score: 70% Supplemental Materials Section 5 Content Section 5 Content Left Section 5 Content Right Section 6 Content Section 6 Content Left Section 6 Content Right Button Content Rail Content 1 Other offerings from ACI Learning CAPM/ PMP Project Management Professional (ACIL-0012) Cisco Certified Network Associate, Part 1 (CCNA 1) (ACIL-0009) Cisco Certified Network Associate, Part 2 (CCNA 2) (ACIL-0010) CompTIA A+ Core 1 (ACIL-0001) CompTIA A+ Core 2 (ACIL-0002) CompTIA Network + (ACIL-0011) CompTIA Security + (ACIL-0013) Cyber Security Analyst (CSA) (ACIL-0007) EC-Council Certified Hacker (CEH) (ACIL-0014) EC-Council Certified Network Defender (CND) (ACIL-0006) View All Courses Page Content