Module 3: Digital Forensics
INTRODUCTION – Digital Forensics This module will cover the forensic process, different sources of forensic data, and the importance of the chain of custody during digital forensics. Learning Objectives: Methods to identify a cyberattacker using network data Synthesize various sources of network data and data obtainable from each Describe the Layers of TCP/IP model and … Read more