< All Computer Hacking and Forensics Notes

jostroot | Computer and Hacking Forensics | Module 2 - Investigative Process

By: jostroot | Related Course: Computer Hacking and Forensics | Published: October 15, 2017 | Modified: October 15, 2017
Join Cybrary

NotepadLaws to Know

Know these:

18 USC 1361 Malicious Mischief
18 USC 1029 Fraud Access Dev.
18 USC 1030 Fraud Computers
Rule 402 Admissible Evidence
Rule 901 ID & Authentication
Rule 608 Conduct of witness
Rule 609 Impeachment of Evidence
Rule 502 Attourney client privilege
Rule 614 Interrogation of witness
Rule 701 Opinion testimony
Rule 705 disclosure of facts
Rule 1002 Req of orig
Rule 1003 Admissibility of Duplicates

1986 Electronic communications privacy act (ECPA)
2001 USA Patriot Act
1980 Privacy Protection Act
          Cable Comm Policy Act


< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel