The moments after a breach can make or break an organization. When the unthinkable happens and a cybercrime is discovered, the actions taken by the security operations team can either contain the damage and restore order or lead to catastrophic consequences. This course examines the tools and techniques used to conduct investigations into cybercrimes and teaches the defensive skills necessary to ensure a breach doesn’t occur in the first place.



Engage in simulation exercises that mirror real-world cyber breaches to develop skills in identifying attack vectors, executing response plans, and managing recovery steps effectively.
Practice conducting thorough post-incident reviews to extract lessons learned, with a focus on clear, concise, and impactful communication to leadership and other stakeholders under pressure.
Engage in hands-on practices for secure and methodical evidence collection, emphasizing the integrity and admissibility of digital evidence. Techniques will include creating verified copies of data and ensuring a clear chain of custody.
Gain practical experience with forensic tools such as Kali Linux and Wireshark. Students will learn to utilize these tools for in-depth analysis of digital evidence, identifying and interpreting key data from various sources.
Learn specialized techniques for investigating operating systems and analyzing email evidence. Students will explore how to retrieve and interpret logs and data from Windows, Linux, Mac, iOS, and Android, and how to uncover the true origins and paths of email communications.
Learn the art of compiling detailed forensic reports that clearly document the investigation process, findings, and adherence to legal standards. Emphasis will be placed on creating reports understandable by both technical and non-technical stakeholders.
This course is delivered online through an institution of the Lower Cost Models Consortium (LCMC) that is different than your degree-granting institution that awards the academic credit for the course.