Explores forensic artifacts contained in digital devices, security mechanisms available to protect digital devices and mechanisms available to cybersecurity professionals for analysis of digital devices. Topics include file structure and recovery of IoT and cell phone forensic data, network data capture and analysis, enterprise mobile device management analysis and forensic investigation of digital devices (IoT, telematics systems, etc.) that interact with cell phone and other devices. Incident response, timeline analysis, and detection and analysis of artifacts will be explored in a hands-on and lab-centric course using a variety of open-source tools and commercial cloud services.