Other Trainings

Introduction To Computer Forensics

Training Synopsis

Uses technology to search for digital evidence of a crimes.

Introduction

Learning Objective

Duration

Methodology

Target Participants

Course Outline

Training Certificate

Why Us?

Introduction

Computer Forensics is about Collection, preservation, analysis and presentation of computer-related evidence. Determining the past actions that have taken place on a computer system using computer forensic techniques. Computer forensics uses technology to search for digital evidence of a crimes. It attempts to retrieve information even if it has been altered or erased so it can be used in the pursuit of an attacker or a criminal. The technique is also employed for incident Response and live System Analysis. Sometimes it is called Post-Mortem Analysis.

Learning Objective

Participant fulfilling, or aspiring to fulfill, the responsibilities of a computer forensic examiner can benefit from this course. It provides the essential knowledge base to experience more about what computer forensic examiners have to do to build up an evidence against, say, a hacker or a computer criminal. The material is organized to provide a high-level view of the process and methods used in an investigation. Both law enforcement personnel and non-law enforcement can benefit from the topics presented.

Participants will build up skills and knowledge to perform simple computer forensics to gather evidence against a crime that took place using a computer or the computer was the target.

Duration

1 day (9.00am to 5.00pm) or duration proposed at quotation.

Methodology

Training session includes classroom lecture, exercises, group work and discussion.

Target Participants

Information Security staff, Information operation unit staff.

Course Outline

  1. Defining Computer Forensics
  2. Reasons for gathering evidence
  3. Steps of Computer Forensics
  4. Handling Evidence
  5. Investigation initiation / response
  6. Handling Information
  7. Tools
  8. Anti-Forensics
  9. Evidence processing guidelines
  10. Methods of hiding and discovering Information/data

Training Certificate

Certificate of Attendance will be issued to participants who fully participated the training and satisfied the attendance requirements.

Why Engage aNTS / Peplow-Warren?

Peplow-Warren Consultant Team is formed by a group of experienced sector expert, certification auditors, consultants and industry practitioners. They actively involve in international standard and specifications development by acting as active ISO and MOSTI Technical Committee Member. They carry a common mission: they are willing to share their good knowledge with current industry practitioners. Call us today for more detail. We are obliged to work together and grow your business.

Investment

Contact our Customer Care Hotline 012-713 3356 / 011-2128 4750 or email to ntsask@gmail.com / sales@peplow-warren.com for your best solution and offer.