-
Articulate the complexity of and apply thinking skills to how the network and application infrastructure affects technology forensics investigations and incident response procedures.
-
Identify and apply in a forensics context the various topologies, standards, technologies and protocols employed in computer systems, including file system formats and their attributes.
-
Evaluate, select, and deploy computer forensic measures for the response, mitigation and analysis of a security incident pertaining to digital artifacts and how information was compromised.
-
Analyze and evaluate the current investigative and legal aspects of information and computer forensics including electronic discovery, deposition, litigation and corporate personnel processes.
-
Evaluate and execute the strategies, methodologies, technique, and state-of-the-art forensics tools for the preservation of digital evidence on computer systems, network systems and other electronic devices.
-
Create tracking processes to follow the trail of electronic evidence through digital systems, including documentation, formal reporting and presentation.