Having studied this course, you are expected to be able to:

1. Define computer forensics.

2. Identify the process in taking digital evidence.

3. Describe how to conduct an investigation using methods of memory, operating system, network and email forensics. 

4. Assess the different forensics tools. 

5. Differentiate among different types of security attacks.

6. Describe the concept of ethical hacking.


Last modified: Thursday, 14 June 2018, 1:31 AM