Computer Forensenic by TED Training

Binjai 8 Premium Soho, Lorong Binjai, Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

Description

This workshop is intended as general introduction to the complex field of Forensic Computer Investigations and to give practitioners who may be contemplating entry into the field an idea of the challenges they may face.

Prerequisites

There is no requirement for experience of Hard Disc Drive technology but an understanding of computer file systems and networking will be of benefit.

Course Objectives

Delegates will be able to outline the ‘anatomy’ of forensic data investigations, the circumstances in which they may arise and the expectations of potential Users and Clients.

Course Outline

DAY 1

MODULE 1: EVIDENCE CONTROL & DOCUMENTATION

  • Document! Document! Document!
  • Evidence Collection & Inventory
  • Chain of Custody
  • Evidence Storage & Security
  • Federal Rules of Evidence

MODULE 2: CRIME SCENE RESPONSE

  • Preparation: Your Response Kit
  • Securing the Scene
  • Photographing the Scene
  • Marking & Inventorying
  • Live Response
  • Post Mortem Examination

MODULE 3: BUILDING A FORENSICS LABORATORY

  • Laboratory Standards
  • Facility Physical Security
  • Evidence Security
  • Software
  • Hardware
  • Portable Forensics Lab

MODULE 4: COMMERCIAL FORENSICS SOFTWARE TOOLS

  • The Case for Commercial Tools
  • EnCase
  • Access Data Forensics Tool Kit
  • DriveSpy & Paraben

MODULE 5: OPEN SOURCE FORENSICS TOOLS

  • Open Source Forensics Tools
  • Linux dd
  • Autopsy & The Sleuth Kit
  • Helix
  • Forensic Incident Response Environment
  • Knoppix

DAY 2

MODULE 6: BASICS OF DISK IMAGING

  • Types of Disk Duplication
  • Bitstream Images
  • Importance of Slack space/Unallocated space
  • Hashing

MODULE 7: DISK IMAGING TOOLS

  • Dd
  • Symantec Ghost
  • FTK Imager
  • Encase
  • Hardware Imagers

MODULE 8: DISK ANALYSIS

  • Disk Basics
  • Disk Structures – Fat File System
  • Disk Structures – NTFS File System
  • Disk Structures – EXT2/EXT3 File Systems

MODULE 9: FILE ANALYSIS

  • What are you looking for?
  • File Attributes
  • Known File Type Signatures && Hashes
  • Malware
  • Steganography

Register Now!

Course Schedule

Add A Review


Please enter input field

sanu
TED Learning Sdn Bhd
Training Institute

Book your course now

Enquiry

Your enquiry submitted successfully

Enquiry Submission failed

Please enter input field(s)

Claim this course

To manage this course details kindly claim this course.