Computer Forensics
Image Computer Forensics is the art and science of applying computer science to aid the legal process. Computer forensics requires specialized expertise and tools that goes above and beyond the normal data collection and preservation techniques available to end-users or system support personnel.

Computer Forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases.

This process often involves the investigation and examination of data that resides on digital media such as data storage devices, hard drives, portable data devices (USB Drives, External drives, Micro Drives and many more).

Electronic evidence is critical in the following situations: Computer break-ins, Possession of pornography, Breach of contract, Industrial espionage, E-mail Fraud, Bankruptcy, Disputed dismissals, Web page defacements, Theft of company documents etc.

About this workshop

This workshop will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this workshop, including software, hardware and specialized techniques.

The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?"

Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the workshop for you.

This 40 hours highly interactive workshop will help participants have hands on understanding and experience in Incident Response & Computer Forensics.

Benefits

Proper understanding of computer forensics is important to handle incident response and digital evidence.

Expertise in computer forensics is an absolute requirement for a career in incident response management and could be followed by management level certifications like CISA, CISSP, CISM, CRISC and ISO 27001.

There are many reasons to learn computer forensics:

  • Prepare how to respond appropriately to incidents
  • Understand how to handle a computer forensic investigation
  • Understand how to create digital evidence
  • Bring computer forensic expertise to the organization
  • Become more marketable in a highly competitive environment

Therefore this workshop will helps participants take the first step into the world of digital forensics and gives a better understanding of how to handle incidents and the various tools which are used to gather digital evidence.

Who should attend

This workshop will significantly benefit professionals responsible for handling computer security related incidents.

  • Police / Law Enforcement personnel
  • Cyber Crime Cell
  • Defense / Military Personnel
  • E-Business Security Professional
  • Legal Professional
  • Finance / Banking Professional
  • Insurance Professional
  • IS / IT Specialist / Analyst / Manager
  • IS / IT Auditor / Consultant
  • IT Operations Manager
  • Security Specialist / Analyst
  • Security Manager / Architect
  • Security Consultant / Professional
  • Incident Response Specialist / Manager
  • Computer Forensic Investigators

Anyone aspiring for a career in Incident Response & Computer Forensics would benefit from this workshop.

Workshop Outline

The entire workshop is a combination of theory and hands-on sessions conducted in a dedicated computer forensics lab environment.

  • Computer Forensics in Today's World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation using AccessData FTK
  • Forensics Investigation using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness
Customer Feedback