Computer Forensic Course

Computer Forensic Training Computer Forensic Workshop
By TED Integrated
System Security:

Computer Forensic Workshop

“Learn to investigate IT crimes with Forensic techniques.”

By TED Integrated


PSMB Certified Training Provider
Request for In-house TrainingRequest for In-house Training
Register for Public Training Public program not yet available
Email Customer Service [email protected] Contact Customer Service +603-2386-7788
Course Title:
Computer Forensic Workshop
Training Category:
Information Technology
Target Audience:
IT Support management, technicians and analysts in Law Enforcement, Public Bodies, Corporate and the Legal Sector.
Duration:
2 Days
For In-house Training
Request for Quotation Request for Quotation
For Other Inquiries
Contact TED Integrated
Contact customer service +603-2386-7788
Email customer service [email protected]
Delivery Methods
  • Language: English
  • PowerPoint Presentation
  • Presentation Handouts
  • Computer Lab Work
  • Certificate of Participation
*Terms & Conditions

Course Introduction ›

This workshop is intended as general introduction to the complex field of Forensic Computer Investigations and to give practitioners who may be contemplating entry into the field an idea of the challenges they may face.

Course Objectives ›

Delegates will be able to outline the ‘anatomy’ of forensic data investigations, the circumstances in which they may arise and the expectations of potential Users and Clients.

Prerequisites ›

There is no requirement for experience of Hard Disc Drive technology but an understanding of computer file systems and networking will be of benefit.

Course Outline ›

DAY 1

Module 1: Evidence Control & Documentation

  • Document! Document! Document!
  • Evidence Collection & Inventory
  • Chain of Custody
  • Evidence Storage & Security
  • Federal Rules of Evidence

Module 2: Crime Scene Response

  • Preparation: Your Response Kit
  • Securing the Scene
  • Photographing the Scene
  • Marking & Inventorying
  • Live Response
  • Post Mortem Examination

Module 3: Building a Forensics Laboratory

  • Laboratory Standards
  • Facility Physical Security
  • Evidence Security
  • Software
  • Hardware
  • Portable Forensics Lab

Module 4: Commercial Forensics Software Tools

  • The Case for Commercial Tools
  • EnCase
  • Access Data Forensics Tool Kit
  • DriveSpy & Paraben

Module 5: Open Source Forensics Tools

  • Open Source Forensics Tools
  • Linux dd
  • Autopsy & The Sleuth Kit
  • Helix
  • Forensic Incident Response Environment
  • Knoppix
DAY 2

Module 6: Basics of Disk Imaging

  • Types of Disk Duplication
  • Bitstream Images
  • Importance of Slack space/Unallocated space
  • Hashing

Module 7: Disk Imaging Tools

  • Dd
  • Symantec Ghost
  • FTK Imager
  • Encase
  • Hardware Imagers

Module 8: Disk Analysis

  • Disk Basics
  • Disk Structures - Fat File System
  • Disk Structures - NTFS File System
  • Disk Structures - EXT2/EXT3 File Systems

Module 9: File Analysis

  • What are you looking for?
  • File Attributes
  • Known File Type Signatures && Hashes
  • Malware
  • Steganography

Contact us now ›

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation services
  • Other inquiries
Contact Customer ServiceCall : +603-2386-7788
Email Customer Service E-mail : [email protected]

Related Courses ›

Published by: ,