This core-level technical course is designed for people looking to develop their computer forensics investigation skills, either for a career in digital investigations or as part of their current cyber role.
COURSE OVERVIEW
Gain an understanding of digital forensics analysis by learning about forensic principles, evidence continuity and methodology to employ when conducting a digital forensic investigation.
This four-day course will provide you with a practical base understanding of the legalities, best practice and methodologies used in the current digital forensic investigation environment. The course content covers seizure, evidence handling and data preservation, through to investigation and interpretation, and finally the reporting and presentation of findings.
Experience with Microsoft Windows OS and, ideally, a general appreciation of forensic principles, practices and software.
WHO SHOULD ATTEND
Those responsible or eager to become responsible for computer forensic investigations, including:
THE SKILLS YOU WILL LEARN
Using practical scenarios based on Windows 7 artefacts with the latest disk technologies, you will learn the following:
• The principles and guidelines for static digital forensic investigations
• The process of evidence continuity
• The fundamentals of the complete forensic investigation process
• The forensic acquisition of an electronic device
• How data is stored on electronic media
• How to work with key forensic investigation products
• How to identify Windows based OS forensic artefacts
The course will also provide answers to many questions including:
KEY BENEFITS
The course will give you:
SYLLABUS
Introduction to Digital Forensics
Investigation Guidelines and Process
Identification & Seizure
Forensic Acquisition
Understanding Electronic Data
Understand how data is stored on electronic devices
Analyse the functionality of a computer file system
Physical and Logical Disks
File Systems and Data Storage
Dates, Times and Metadata
Forensic Analysis Techniques
Windows Artefacts
Function, structure and operation of the Windows registry
Internet history
Recycle bins
Forensic Challenges
Reporting
Collating results
Contents and layout of forensic reports
Electronic data
Hardware and Software
Addressing hardware employed during a forensic investigation
Familiarisation with forensic software
Investigating Windows artefacts
Reporting
Join our public courses in our Istanbul, London and Ankara facilities. Private class trainings will be organized at the location of your preference, according to your schedule.