From the course: Computer Hacking Forensics Investigator (CHFI) Cert Prep

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Computer forensics investigation process: Part 2

Computer forensics investigation process: Part 2

Hey, everybody. Welcome back to the course. So in the last video, we talked about some of the investigative phases as well as we talked about warrants and some of the actions that a first responder might do. In this video, we're going to talk about things like best practices as well as exhibit numbering. So some best practices for investigation. So for a forensic investigation. So, Number 1, we want to have authorization from a decision maker. So that could be a judge. It could be your manager, something like that, basically saying, okay, it's cool to go, you know, open up this investigation. And then, of course, our first response, as we mentioned, the first responders. So generally, those are not investigators. They're generally going to be someone like your IT personnel. So like your system admin, your network admin, it could even be like, you know, an accountant, for example, or like the janitor. Right. So it could technically be anybody. But generally, it's going to be someone in…

Contents