Conducting Investigations
Types of Investigations in Cybersecurity
Evidence Types
Types of Evidence in Cybersecurity
Digital Forensics
Investigating devices to uncover evidence
Phases of Digital Forensics
Identification, Collection, Analysis, and Reporting
Chain of Custody
The paper trail for evidence handling
Collecting Evidence
Order of Volatility and Data Collection Procedures
Preserving Evidence
Preservation of Evidence