Description
Digital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted or damaged, in a forensic manner with the aim to identify, preserve, recover, analyse and present facts and opinions about the digital information.
EssentialOptional
Theoretical Knowledge
ICT network security risksICT infrastructureICT security standardscyber securitylevels of software testingICT security legislationpenetration testing tooltools for ICT test automationquery languagessecurity engineeringinformation confidentialitycomputer forensicsGDPRattack vectorscheck methodsforensic intelligenceoperating systemsaudit techniquescyber attack counter-measuressecurity threatsresource description framework query languagehardware platformsWiresharkSamurai Web Testing Frameworkdata storagecloud technologiesMDXKali LinuxICT encryptionWhiteHat SentinelLINQMaltegoN1QLXQueryTHC Hydrainformation security strategyBlackArchJohn The Ripper (penetration testing tool)Aircrack (penetration testing tool)hardware architecturesNexposeBackbox (penetration testing tool)information architectureLDAPParrot Security OSlegal requirements of ICT productsOWASP ZAPCain and Abel (penetration testing tool)MetasploitSPARQLNessus
Practical Skills
use software for data preservationuse technology for forensicsdevelop information security strategyestablish an ICT security prevention planmanage data for legal mattersdigital data processingmanage IT security compliancesidentify ICT system weaknessesperform forensic preservations of digital devicesprovide ICT consulting advicesecure sensitive customer's informationidentify ICT security risksapply reverse engineeringuse scripting programminggather data for forensic purposespresent evidenceimplement ICT network diagnostic toolsperform ICT security testingeducate on data confidentialitydesign computer networkimplement ICT security policiescollect cyber defence dataanalyse network configuration and performancemanage cloud data and storageperform data mininguse different communication channels