Computer Forensics
Course: FOREN1
Duration: 3 Days
Level: I
On our website at:
http://www.verhoef-training.com/courses/FOREN1.html
Course Summary
Internet crime is on the rise, catapulting the need for computer forensics specialists. This course presents you with an up-to-date overview of the basic skills that are required as a computer forensics professional and introduces the latest software and tools that exist. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks.
Topics Covered In This Course
The Need for Computer Forensics
- Defining Computer Forensics
- Computer Crime in Real Life
- Corporate versus Law Enforcement Concerns
- Training
Preparation?What to Do Before You Start
- Know Your Hardware
- Know Your Operating System
- Know Your Limits
- Develop Your Incident Response Team
Computer Evidence
- What Is Computer Evidence?
- Search and Seizure
- Chain of Custody
- Admissibility of Evidence in a Court of Law
- Leave No Trace
Common Tasks
- Evidence Identification
- Evidence Preservation
- Evidence Analysis
- Evidence Presentation
Capturing the Data Image
- The Imaging Process
- Partial Volume Images
- Working with Virtual Machines
- Imaging/Capture Tools
Extracting Information from Data
- What Are You Looking For?
- How People Think
- Picking the Low-Hanging Fruit
- Hidden Evidence
- Trace Evidence
Passwords and Encryption
- Passwords
- Encryption Basics
- Common Encryption Practices
- Strengths and Weaknesses of Encryption
- Handling Encrypted Data
Common Forensic Tools
- Disk Imaging and Validation Tool
- Forensic Tools
- Your Forensic Toolkit
Pulling It All Together
- Creating Easy-to-Use Reports
- Document Everything, Assume Nothing
- Formulating the Report
- Sample Analysis Reports
- Using Software to Generate Reports
How to Testify in Court
- Preparation Is Everything
- Appearance Matters
- What Matters Is What They Hear
- Know Your Forensic Process and Tools
- Say Only What You Must
- Keep It Simple
- Be Ready to Justify Every Step
What You Can Expect
In this course, you will learn how to?
- conduct a computer forensics investigation
- find hidden data, capture images, document your case, and present evidence in court as an expert witness
- identify, collect, and preserve computer evidence
- understand encryption and examine encryption files
Who Should Take This Course
IT Administrators that need to enhance their skills in computer forensics to enable them to better deal with cyber crime.
Recommended Prerequisites
Sound general IT administration knowledge.
Training Style
Instructor led with lecture, discussion and exercises.
Related Courses
Code |
Course Title |
Duration |
Level |
|
AUDITE |
Essential Audit Skills |
5 Days |
I |
Details |
SMAC |
Security Management and Control (Deployment/Maintenance of Confidential Data) |
5 Days |
I |
Details |
CISA |
Certified Information Systems Auditor |
5 Days |
II |
Details |
Every student attending a Verhoef Training class will receive
a certificate good for $100 toward their next public class taken
within a year.
You can also buy "Verhoef Vouchers" to get a discounted rate for a
single student in any of our public or web-based classes.
Contact your account manager or our sales office for details.