Determine the nature and extent of an incident by applying the principles of digital forensics, including where appropriate reconstructing a cyber-incident.
Analyze volatile data, nonvolatile data and files of unknown origin.
Compare the priorities of cyber forensics for different communities
Evaluate and integrate different tools to create a personal forensics toolkit.
Defend the results of an investigation to various audiences including technical, legal and management.
Create and justify forensic checklists for both existing and new technologies using established methods.