The course is ideal for individuals who conduct computer security reviews, computer based internal audits and computer related investigations. The participants in this course typically are employed by government agencies, law enforcement agencies, Fortune 500 corporations and computer consulting firms. They usually have extensive experience in computer operation, DOS, Windows, Windows NT, and Unix. Many of the participants have computer science degrees and advanced degrees. Because computer forensics methods and tools can be used to defeat government and corporate computer security, this training course is not open to the general public.