What Will You Learn? This course will give you an in-depth study of the computer forensics process. Starting from creating evidentiary disk images to recognizing the often-faint trail of unauthorized activity, Foundstone updates this class continuously by integrating the latest security threats and countermeasures. In this hands-on classroom, you will learn how to respond to unlawful access and information theft, learning to recognize the traces of numerous attacks. While in the security lab, you will learn to apply this knowledge. With Foundstone’s expert instruction, you learn step-by-step incident response procedures for UNIX, Windows systems, and mobile devices. These methods are tailored to your organization’s security architecture, so you can apply them in the real world long after class is completed.