Certified Digital Forensics Examiner
BENEFITS OF THIS COURSE
This course will benefit government security agencies as well as organizations intent on pursuing any corrective action, litigation, or proof of guilt based on digital evidence.
Example: termination of an employee for a computer policy violation and using a digital artifact to support the allegation. The investigator must furnish irrefutable burden of proof from the digital artifact. Without properly complied proof, an attorney knowledgeable about Computer Forensics could have the case thrown out. Similarly, government or investigative agencies need to be able to successfully prosecute or defend cases such as terrorist activates, illegal pornography, acts of fraud, counterfeiting, and so forth.
Computer Forensics was developed by U.S. federal law enforcement agents during the mid to late 1980s to meet the challenges of white-collar crimes committed with the assistance of a PC. By 1985 enforcement agents were being trained in the automated environment and by 1989 software and protocols were beginning to emerge in the discipline.