While there is remarkable dependency on online and web applications, there is also a rapid increase in number of cyber and digital crimes. In such situation it is inevitable to have professionals equipped with the necessary knowledge and skills to discover what possible damage or digital crime has been done on computing devices and applications, when it was done, and how it was done. The aim of this course is to cover method and techniques used when investigating digital data. It will discuss technical issues in acquiring computer related evidence. The course will cover several topics such as: Incident Response in various operating systems, Web Activity Reconstruction, Email Activity Reconstruction, Windows Registry Reconstruction, Forensic tools and Network forensics.