The document outlines the steps of a cyber forensic investigation process: 1. Verification and identification of systems involved to collect relevant data. 2. Preservation, collection and acquisition of evidence from systems in a manner that minimizes data loss and maintains a legally defensible chain of custody. 3. Processing, review and analysis of collected data through techniques like timeline analysis, keyword searching and data recovery to find relevant evidence.