This course instructs students in the preservation, identification, extraction, documentation and interpretation of computer data. Students will learn to examine computer data for evidence of a crime or violations of corporate policy. Topics covered include evidence handling, chain of custody, collection, and recovery of computer data using forensic software and methods.