This instructor led, online training course will help students better understand the methodology for conducting a computer forensic examination.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
COURSE DURATION
3h
Skills Learned
After completing this online training course, students will be able to:
Understand concepts in Forensics investigations
How to set-up a lab and how to get it accredited
Proper evidence gathering
How to find hidden information in pictures, audio, and video files
Mobile and Desktop OS Forensics
This course is designed for IT Managers, System Administrators, Security Personnel, and other professionals who are involved with information system security, computer forensics, and incident response.
None, but we recommend that students:
- Complete CompTIA Network+ or have equivalent knowledge
- Understand cyber security fundamentals
01.
- Forensics Introduction: Concepts and objectives in Forensic Invesitgations
- Digital Evidence: Considerations when dealing with digital information
- Computer Investigations: An overview of the processes around forensic investigations
- Computer Forensics Labs: Physical setup, tools, and lab accreditation
- Acquiring Evidence: Properly gathering evidence
- Storage Media: Different storage media and how it impacts forensic investigations
- Image Files and Steganography: Hidden information in picture, audio, and video files
- Windows Forensics: Tools, logs and other notes regarding Windows Forensics
- Linux Forensics: Tools, logs, and other notes regarding Linux forensics
- Mobile Forensics: Tools, logs and other notes regarding Mobile forensics
- Network Forensics: Tools and techniques for gathering evidence from network sources
- Attacking web applications: Tools and techniques for gathering evidence from web servers
- Jury summons: Considerations for when a case goes to trial
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Understand concepts in Forensics investigations
How to set-up a lab and how to get it accredited
Proper evidence gathering
How to find hidden information in pictures, audio, and video files
Mobile and Desktop OS Forensics
WHO SHOULD ATTEND
This course is designed for IT Managers, System Administrators, Security Personnel, and other professionals who are involved with information system security, computer forensics, and incident response.
PREREQUISITES
None, but we recommend that students:
- Complete CompTIA Network+ or have equivalent knowledge
- Understand cyber security fundamentals
COURSE OUTLINE
01.
- Forensics Introduction: Concepts and objectives in Forensic Invesitgations
- Digital Evidence: Considerations when dealing with digital information
- Computer Investigations: An overview of the processes around forensic investigations
- Computer Forensics Labs: Physical setup, tools, and lab accreditation
- Acquiring Evidence: Properly gathering evidence
- Storage Media: Different storage media and how it impacts forensic investigations
- Image Files and Steganography: Hidden information in picture, audio, and video files
- Windows Forensics: Tools, logs and other notes regarding Windows Forensics
- Linux Forensics: Tools, logs, and other notes regarding Linux forensics
- Mobile Forensics: Tools, logs and other notes regarding Mobile forensics
- Network Forensics: Tools and techniques for gathering evidence from network sources
- Attacking web applications: Tools and techniques for gathering evidence from web servers
- Jury summons: Considerations for when a case goes to trial
SCHEDULE