top of page

TECHNOLOGY FORENSICS

  •  Articulate the complexity of and apply thinking skills to how the network and application infrastructure affects technology forensics investigations and incident response procedures.

  • Identify and apply in a forensics context the various topologies, standards, technologies and protocols employed in computer systems, including file system formats and their attributes.

  • Evaluate, select, and deploy computer forensic measures for the response, mitigation and analysis of a security incident pertaining to digital artifacts and how information was compromised.

  • Analyze and evaluate the current investigative and legal aspects of information and computer forensics including electronic discovery, deposition, litigation and corporate personnel processes.

  • Evaluate and execute the strategies, methodologies, technique, and state-of-the-art forensics tools for the preservation of digital evidence on computer systems, network systems and other electronic devices.

  • Create tracking processes to follow the trail of electronic evidence through digital systems, including documentation, formal reporting and presentation.

bottom of page