📋
A Journey From IT to IT Security
  • IT Training Resources
  • IT Security Roles
    • Web Application Security Specialist
      • Training Guide
      • Self-hosted Training Lab
        • Vulnerable Web Apps
      • Web Security testing Methodology
        • 1 Footprinting
        • 2 Scanning
        • 3 Enumeration
        • 4 Gaining Access
        • 5 Maintain Access
        • 6 Covering Tracks
        • 7 Vulnerability assessment
    • DevSecOps Engineer
      • Training Guide
      • Building a DevSecOps CD/CI Pipeline
        • Self-hosted DevOps CD/CI platforms
        • Software Component Analysis (SCA)
        • Static Application Security Testing (SAST)
        • Dynamic Application Security Testing (DAST)
        • System Hardening
        • System Compliance Analysis
        • Vulnerability Analysis
      • Ready-to-use and train DevSecOps CD/CI Pipeline
    • Chief Information Security Officer (CISO)
    • Digital Forensics Investigator
      • Forensics Methodology
    • Cloud Security Engineer
      • Getting started with kubernetes
  • Resources
    • IT Basics
      • Networking Basics Study Guide
      • RBAC / ABAC
      • Anonymous Surfing
      • Python Programming
      • Infrastructure as code
      • Containers
        • Docker
        • Docker security
      • The Security Development Lifecycle (SDL)
    • Literature
    • Useful Tool Tutorials
    • Useful Online Tools
    • Exploits
  • Unsorted
    • Gitlab-ci with docker-compose
Powered by GitBook
On this page
  • For whom?
  • What is a digital forensics investigator?
  • Ethics
  1. IT Security Roles

Digital Forensics Investigator

PreviousChief Information Security Officer (CISO)NextForensics Methodology

Last updated 3 years ago

For whom?

  • Incident Analysrs who want to freshen up their skills.

  • Test Engineers who want to move into incident response teams.

  • Journalists who want to understand how to gather digital evidence.

What is a digital forensics investigator?

A digital forensics investigator or analyst usually is part of an incident response team.

In the investigation process the investigator identifies, gather, preserve, extract, interpret, document and preserve evidence from computers in a legal way.

Investigators help in different areas such as: Crime, Civil (dispute of two parties, monetary damage), Administrative investigation (within a company, policy violation, threatening, internal, corruption).

Forensics investigators challenges are

  • Encryption

  • Steganography

  • Data wiping/Anti-Forensics

  • Legal

  • Media formats

  • Volume of data

  • Time limitations

Ethics

fairness - Integrity - Conflict of interest

LogoComputer Hacking Forensic Investigator (CHFI)EC-Council