Certificate of Proficiency in Digital Evidence & eDiscovery Law Practice in Nigeria

Weekly training modules are based on the textbook: DIGITAL EVIDENCE & eDISCOVERY LAW PRACTICE IN NIGERIA by the Convener of the course Emeka Arinze Esq, LLM, M.I.T (info-tech), CBSP (Certified Biometric & Surveillance Professional, CDEA (Certified Digital Evidence Analyst), CCI (Certified Cybercrime Investigator), CFP (Certified Forensic Professional).

Learn More About Emeka Arinze

WEEK

34

5 hours to complete
Digital Forensic Investigative Tools See Chapter 34 of the book for further reading

It is not in debate that electronic data contain information of investigative value stored on and transmitted by electronic devices. In its natural state, we cannot “see” what is contained in the physical object that holds the evidence. The existence of the digital information cannot be well perceived by human senses. This is because the record has been electro-magnetically recorded and stored in the computer system and networks. It is, therefore, impossible to perceive its content or visibility without the help of a suitable toolkit, equipment and software.

These tools that provide the ability to bring back in-depth information about what’s “under the hood” of a system are the actual drivers of the digital forensics industry, without which cybercrime or computer crime investigation cannot be carried out. These tools, found essentially reliable, and having produced results used in courts for admissibility purposes, can be classified into various categories, such as: hardware imaging tool; authentication software tool; decryption tools; audit log file tool; IP address tracker; email address tracker and a host of others.

The Focus of this Weekly Module

The process of collection of digital data for investigative purpose must in no way compromise the evidential veracity. The typical goal of an investigation is to collect evidence using generally acceptable tools and methods in order to make the evidence acceptable and admitted in court. This weekly task therefore, undertakes in a most stringent and detailed manner the inherent capabilities, contents and evidentiary values of these tools comprising hardware imaging tool; authentication software tool; decryption tools; audit log file tool; IP address tracker; email address tracker and a host of others

Gains and Benefit

On completion of the lecture as espoused in the video, reading activity, quiz and assessment, you will be able to understand:

  • disk Imaging Tool;
  • authentication software tool;
  • decryption tools;
  • audit log file tool;
  • IP address tracker;
  • email address tracker and
  • Email Recovery Tool
1 Video (Total 20 min), 1 reading, 1 quiz, 1 assignment SEE ALL
1 video
Digital Forensic Investigative Tools
1 readings
Module Guide
1 quiz
Activity - Answer a 30 min question & answer test
1 assignment
Assignment title goes here