{"id":387,"date":"2025-04-04T17:53:58","date_gmt":"2025-04-04T17:53:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/lexibowman\/?page_id=387"},"modified":"2025-04-04T18:26:55","modified_gmt":"2025-04-04T18:26:55","slug":"cyse-407-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/lexibowman\/cyse-407-2\/","title":{"rendered":"CYSE 407"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Digital Forensics<\/h2>\n\n\n\n<p>The Digital Forensics class was a game-changer for me. It\u2019s given me practical skills that directly relate to my interest in cybersecurity, especially when it comes to handling and analyzing digital evidence. The course focused on the fundamental techniques and tools used for collecting, preserving, and processing digital evidence from computers, mobile devices, and networks. It also covered the critical steps in digital forensics investigations, such as identifying and acquiring evidence, preserving its integrity, and analyzing it to support legal cases.<\/p>\n\n\n\n<p>One of the most useful things I learned was how to preserve the integrity of evidence while collecting it, which is crucial when handling any kind of digital data, especially when it\u2019s used in court. I also learned how to write up my findings clearly for reporting purposes, which is key in the field, as these findings can make or break a case.<\/p>\n\n\n\n<p>This class has helped me understand how digital forensics fits into the bigger picture of cybersecurity. Knowing how to track down digital evidence is essential for investigating cybercrimes, and being able to properly handle that evidence means I\u2019m better prepared to work in any role that requires investigating security breaches, fraud, or other cybercrimes.<\/p>\n\n\n\n<p>To see examples of my work go to the My Work page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Forensics The Digital Forensics class was a game-changer for me. It\u2019s given me practical skills that directly relate to my interest in cybersecurity, especially when it comes to handling and analyzing digital evidence. The course focused on the fundamental techniques and tools used for collecting, preserving, and processing digital evidence from computers, mobile devices, [&hellip;]<\/p>\n","protected":false},"author":29606,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/pages\/387"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/users\/29606"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/pages\/387\/revisions"}],"predecessor-version":[{"id":408,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/pages\/387\/revisions\/408"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/media?parent=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}