Implementation And Management of Computer Forensics Processes


Price:                                      4000USD
Duration:                               5 Days
Timings:                                 Flexible

Implementation and Management of Computer Forensics Processes Course Summary

Implementation and Management of Computer Forensics Processes is a five-day intensive course enables the participants to develop the necessary expertise in mastering the computer forensics processes as specified in CLFE certification. Participants will gain a thorough understanding of fundamental computer forensics, based on the best practices used to implement the forensics evidence recovery and analytical processes. The CLFE certification focuses on core skills required to collect and analyze data from Windows, Mac OS X, Linux computer systems, as well as from mobile devices.

 

Who should attend?

  1. Computer Forensic specialists
  2. Electronic data analysts
  3. Specialists in computer search and evidence recovery
  4. Professionals working or interested in law enforcement
  5. Professionals willing to advance their knowledge in computer forensic analysis
  6. Members of an information security team
  7. Expert advisors in information technology
  8. Individuals responsible for examining media to extract and disclose data

 

Learning objectives

  1. To ensure that the CLFE can protect him or herself against injury, threat to credibility and protect the integrity of the examined media throughout the computer forensics operation
  2. To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action to be followed in order to achieve the goal of the operation
  3. To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the presence of certain ports to the actual or eventual presence of a media containing information to be examined
  4. To ensure that the CLFE has a clear knowledge where the information can be found on an electronic media or bit-stream image of a media, it would be operating the systems or user information, actual deleted or hidden information
  5. To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence located on a network, in the cloud or in a virtual environment
  6. To ensure that the CLFE can conduct a basic, yet forensically sound examination of a cell phone or tablet
  7. To ensure that the CLFE can use efficiently the tools (software, hardware and supplies) of the field examination kit for a better goal achievement of the computer forensics operation
  8. To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and forensically sound manner

 

Course Agenda

Day 1: Introduction to scientific principles of Computer Forensics operations

  1. Scientific principles of computer forensics
  2. Introduction to computer forensics process approach
  3. The analysis and implementation of the fundamental operations
  4. Preparation and execution of forensics procedures and operations

Day 2: The computer and operating structure

  1. Identification and selection of the characteristics of the computer structure
  2. Identification of peripherals and other components
  3. Understanding the operating systems
  4. Extraction and analysis of the file structure

Day 3: Forensics of networks and mobile devices

  1. Understanding the network, cloud and virtual environments
  2. Generic methods for data examination in a virtual environment
  3. Examination of a cell phone or tablet
  4. Enumeration of cell phones and tablets needed for forensics examination
  5. Storage of information in mobile devices

Day 4: Computer Forensics tools and methodologies

  1. Enumeration and examination of the computer hardware and software
  2. Determination and testing of corrective measures
  3. Analysis and selection of the best procedures for computer forensics operation

Day 5: Reporting

  1. Discovery, documentation and return of the evidence on-site
  2. Analyzing and applying the contextual parameters