This document provides an overview of digital forensics and network forensics. It discusses key topics such as the differences between digital forensics and computer security, common types of digital evidence like disk, memory, and mobile forensics, and the basic steps involved in a digital forensics investigation including identification, acquisition, authentication, analysis, and presentation. It also provides examples of tools used for different types of digital forensics examinations and summarizes the scope and career paths within the field of computer forensics.