< All Computer Hacking and Forensics Notes

YoussefM | Computer and Hacking Forensics | Module 3 - Searching and Seizing

By: YoussefM | Related Course: Computer Hacking and Forensics | Published: October 19, 2017 | Modified: October 19, 2017
Join Cybrary

NotepadSearching and Seizing

Searching and Seizing
In Module 3, Searching and Seizing, we introduce you to the very complex subject which is heavily focused of legalities and legal terminology.
We begin with a discussion on the 4th Amendment, which protects us as citizens against illegal search and seizure. You’ll learn the complexities imposed by the Patriot Act within the scope of the 4th Amendment and then dive into subcomponents such as defining what’s with and outside a given scope, and why that makes a difference to the process of search and seizure.
Next we’ll discuss when a search warrant is required vs. when it’s not needed and the types of conflicts that presents. And finally we’ll explore the process of Discovery, define what it is and where & how that comes into play in the Search and Seizure life cycle, particularly as it relates to search location such as a private home vs. outside your home, at the state boarder vs. a country’s boarder.

< All Computer Hacking and Forensics Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?