Shield labeled Protect and Defend Binary Digits and Magnifying Glass labeled Investigate

Overview of computer forensics: Computer investigation processes; operating systems boot processes and disk structures; data acquisition and analysis; technical writing; review of computer forensics tools; ethics; and objectives of International Association of Computer Investigative Specialists (IACIS) certification.

NICE Framework Connections