Capstone in Digital Forensics
DELIVERABLES Cybersecurity: Digital Forensics and Incident Response Digital forensics : Collect, analyze and present digital evidence such as user activity and system data. Attempt to uncover the facts about what happened on a computer system, network devices, phones or tablets for internal company investigations, criminal activity and other types of digital investigations. Incident response : investigate computer systems by collecting and analyzing data. Then develop a response to a security incident. Cybersecurity: Risk Management Build a Cybersecurity Risk Management Framework for the Organization Cybersecurity: Information Assurance: Develop an Information Assurance (IA) plan that can identify the potential risks to that data throughout the development, use, storage, transmission, and processing of an application. The plan can help guarantee the availability, integrity, authentication, confidentiality, and non-repudiation of information and information systems.