(3) Introduces the process of forensic investigation, chain of custody, forensics analysis, court proceedings and the legal justice system including examination of digital storage and network traffic from personal computers, enterprise systems, embedded devices, and mobiles.