Certified Forensic Investigation Practitioner (CFIP) Training in Sweden

  • Learn via: Classroom
  • Duration: 5 Days
  • Price: From €4,225+VAT
We can host this training at your preferred location. Contact us!

This core-level technical course is designed for people looking to develop their computer forensics investigation skills, either for a career in digital investigations or as part of their current cyber role.

COURSE OVERVIEW

Gain an understanding of digital forensics analysis by learning about forensic principles, evidence continuity and methodology to employ when conducting a digital forensic investigation.

This four-day course will provide you with a practical base understanding of the legalities, best practice and methodologies used in the current digital forensic investigation environment. The course content covers seizure, evidence handling and data preservation, through to investigation and interpretation, and finally the reporting and presentation of findings.

Experience with Microsoft Windows OS and, ideally, a general appreciation of forensic principles, practices and software.

WHO SHOULD ATTEND

Those responsible or eager to become responsible for computer forensic investigations, including:

  • Cyber Forensic & Network Investigators
  • IT Security Officers
  • Law Enforcement Officials

THE SKILLS YOU WILL LEARN

Using practical scenarios based on Windows 7 artefacts with the latest disk technologies, you will learn the following:

• The principles and guidelines for static digital forensic investigations

• The process of evidence continuity

• The fundamentals of the complete forensic investigation process

• The forensic acquisition of an electronic device

• How data is stored on electronic media

• How to work with key forensic investigation products

• How to identify Windows based OS forensic artefacts

The course will also provide answers to many questions including:

  • What skills and qualifications do I need to practice digital forensics?
  • How and where is data actually stored on a device?
  • What is the difference between forensic imaging and cloning?
  • Is keyword searching an effective way to identify data on a device?
  • What is hashing and how can it be used in digital forensics?
  • What happens when a user deletes a file or empties a recycle bin?
  • How does ‘Private’ web-browsing work?
  • Can data be recovered after 7 pass overwrite?
  • Is there a backdoor to passwords and encryption?
  • Who was using a computer on a particular occasion?
  • How can I identify if and when a user edited or accessed a file?

KEY BENEFITS

The course will give you:

  • An understanding of each stage of a forensic investigation, from evidence seizure through to data investigation and interpretation, to report and presentation of findings
  • The skills to allow you to undertake the forensic acquisition of an electronic device
  • Confidence in working with key forensic investigation products
  • An industry-recognised qualification in forensic investigation and ideal preparation for the 7Safe CFIS advanced course

SYLLABUS

  1. Introduction to Digital Forensics

  1. Investigation Guidelines and Process

  1. Identification & Seizure

  1. Forensic Acquisition

  1. Understanding Electronic Data

  1. Understand how data is stored on electronic devices

  2. Analyse the functionality of a computer file system

  1. Physical and Logical Disks

  1. File Systems and Data Storage

  1. Dates, Times and Metadata

  1. Forensic Analysis Techniques

  1. Windows Artefacts

  1. Function, structure and operation of the Windows registry

  2. Internet history

  3. Recycle bins

  1. Forensic Challenges

  1. Reporting

  1. Collating results

  2. Contents and layout of forensic reports

  1. Electronic data

  1. Hardware and Software

  2. Addressing hardware employed during a forensic investigation

  3. Familiarisation with forensic software

  1. Investigating Windows artefacts

  1. Reporting



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Sweden facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
07 borgemánnu 2024
Stockholm, Malmö, Göteborg
5 Days
Classroom / Virtual Classroom
11 borgemánnu 2024
Stockholm, Malmö, Göteborg
5 Days
Classroom / Virtual Classroom
11 borgemánnu 2024
Stockholm, Malmö, Göteborg
5 Days
Classroom / Virtual Classroom
20 borgemánnu 2024
Stockholm, Malmö, Göteborg
5 Days
Classroom / Virtual Classroom
22 borgemánnu 2024
Stockholm, Malmö, Göteborg
5 Days
Classroom / Virtual Classroom
23 borgemánnu 2024
Stockholm, Malmö, Göteborg
5 Days
Classroom / Virtual Classroom
04 golggotmánnu 2024
Stockholm, Malmö, Göteborg
5 Days
Classroom / Virtual Classroom
03 skábmamánnu 2024
Stockholm, Malmö, Göteborg
5 Days
Certified Forensic Investigation Practitioner (CFIP) Training Course in Sweden

Sweden is a Nordic country that borders Norway, Finland and Denmark. The name "Sweden" originated from the "Svear", a people mentioned by the Roman author Tacitus. While being the largest Nordic country, Sweden is the fifth-largest country in Europe. Sweden has a total population of 10.4 million. The capital and largest city is Stockholm. About 15 percent of the country lies within the Arctic Circle, so that's why from May until mid-July, sunlight lasts all day in the north of the Arctic Circle. On the other hand, during December, the capital citt experiences only about 5.5 hours of daylight.

When in Sweden, visiting Stockholm's Old Town Gamla Stan, Sweden's most popular museum Vasa Museum and a UNESCO World Heritage Site; Drottningholm Palace is highly recommended.

Empower yourself with our extensive selection of IT courses, covering programming, data analytics, software development, business skills, cloud computing, cybersecurity, project management. Experience personalized training and expert guidance from our instructors, who will come to your chosen training venue anywhere in Sweden.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.