This course explains investigative methods and standards for the acquisition, extraction, preservation, analysis, and deposition of digital evidence from storage devices. Using realistic forensics situations, learn how to find traces of illegal or illicit activities using computer forensics tools and manual techniques. Also, learn how to recover data intentionally hidden or encrypted by perpetrators.