top of page
Product Page: Text
Network Security Fundamentals 1b: Forensics and Permissions

Network Security Fundamentals 1b: Forensics and Permissions


As the world becomes increasingly more interconnected by technology, computer and mobile-based crimes are becoming more prevalent. Explore cyber forensics, encryption, cryptography and cryptology, user and password management to mitigate large data breaches, and other threats, vulnerabilities, and security issues. Discover what it takes to enter this high-demand career field. As a cybersecurity specialist, you’ll never get bored with trying to keep individuals and organizations safe!

  • Computer and digital forensics is an exciting and emerging field in forensic science. As the world becomes more digitally dependent, it’s only natural there would be an increase in computer-based crimes and a corresponding need to solve them because individuals and organizations alike are negatively impacted by computer crimes. As a result, law enforcement has become modernized by adding digital forensic experts or partnering with them to aid in the collection of evidence in hopes of identifying those responsible for computer crimes.

    What will you learn in this unit?

    • Define computer and digital forensics
    • Summarize the four steps involved in the forensics process
    • Identify when a computer forensics investigation is needed
    • Explain forensics procedures for the collection of digital evidence
    • Describe open-source digital forensic tools
Product Page: Stores_Product_Widget