Applicable to all work environments, cyber investigation scenarios, and technologies, this course addresses the fundamental concepts found in the rapidly evolving field of cyber forensics. The materials explain the basic principles of data as building blocks of electronic evidential matter used in cyber forensics investigations. The text is written in a step-by-step manner, beginning with the elementary building blocks of data, and progressing upwards to the representation and storage of information. Practical examples and illustrations will guide you through the course.
Upon successful completion of this course, participants will be able to:
- Recognize the evolution of computational communication systems, the role of a binary numbering system, and the basics of the character codes of ASCII and Unicode
- Recognize how to convert a binary number into its decimal equivalent, noting why this knowledge is essential for gaining a greater depth of understanding of how data is stored, moved, manipulated, and processed
- Recognize the components of the Hexadecimal format (HEX) used to represent binary values
- Identify file structures, formats, and signatures, noting their roles and relevancy in cyber forensic investigations
- Identify the elements and functions of the boot process, including the Master Boot Record (MBR) and the Basic Input Output System (BIOS)
- Recognize different file systems and their relationship and relevance to cyber forensics
- Recognize the concept of endianness, the attribute of a system that indicates whether integers are represented from left to right or right to left
- Recognize the attributes of volume versus partition, noting mounting the file system, logical block addresses, and the storage and representation of data and its importance to the cyber forensic investigation process
- Identify the components of FAT 12/16 file systems and the 'mounting' of data into identifiable information
- Identify the attributes of file systems beyond FAT, including the New Technology File System (NTFS)
- Identify cyber forensic investigative smart practices, noting the forensic process and the applicable steps in the investigative process
- Cite the sequencing of events and protocols necessary to cyber forensic investigations
- Identify forensic investigative smart practices for incident closure, noting the steps and protocols for communicating findings, reporting, retention and curation of evidence, investigation wrap-up, and the investigator's role as an expert witness
- List the components and steps in the cyber forensic investigation process
Choose Your Preferred Format
Get immediate access to a robust collection of learning and reference materials, allowing you to dive deep into the information you need. Our self-study materials are authored by top-quality, industry experts who focus on helping you grasp concepts quickly using real-life examples. Download your CPE to any device, and take it with you so you can learn when and wherever you want. Complete your CPE with an online exam, and enjoy instant grading with the option to print your certificate immediately upon passing.
Our self-study materials are authored by top-quality, industry experts. You’ll receive a bound notebook of all the course materials, shipped to you within one business day. In addition, you’ll also have full online access. Each self-study package includes a robust collection of learning and reference materials to help you cover the information efficiently and put it into practice immediately.
Experience high-quality instruction with our Self-Study Videos, available to you 24/7. With more than 80+ videos currently in the Western CPE Self-Study Video library, you can see and hear our expert instructors deliver the information you need in a dynamic way that allows you to immediately apply your learning. Unlike a live course or webcast, you can complete the course on your own time, playing and pausing as needed. Self-Study Videos allow you to complete your CPE requirements on your own time.
Back to top