Thursday, December 31, 2009

Computer Forensics Training

Computer Forensics Training

InfoSec Institute: Information Security Training

Computer crimes happen! Did you know that evidence can be found on freshly formatted hard drives, cell phones, and even digital cameras?

The rate of fraud, abuse and downright criminal activity on IT systems by hackers, contractors and even employees are reaching alarming rates. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics duties on their jobs. In terms of job growth, nothing beats computer forensics as a career, and no one can beat InfoSec Institute as the best place to learn from a computer forensics training expert.

......................................................................................

Computer Forensics Training Program Details :

Network Security Courses

InfoSec Institute Computer Forensics featured in NASPA

Computer crime is here to stay. Computer Forensics Specialists are needed by today's companies to determine the root cause of a hacker attack, collect evidence legally admissible in court, and protect corporate assets and reputation. The best way to become a forensics expert is to attend a training session with a computer forensics training expert.

During InfoSec Institute's Computer Forensics Training course you will:

  • See the dark side of how computer crimes are committed.
  • Learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques.
  • Learn how to recover data intentionally hidden or encrypted by perpetrators.

You will also learn how to create an effective computer crime policy, and gain the hands on skills to implement it.

After attending Computer Forensics Training, you will leave with a custom computer forensics toolkit that will enable you to perform a legally admissible forensics investigation and the skills to run the investigation properly.

This hands-on computer forensics training offers practical experience in a wide array of computer forensics situations that are applicable to the real world. Learn everything relating to computer forensics --- from how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media.

Course Includes License of AccessData's FTK 2.0:
Real world computer forensics requires the use of a powerful enterprise forensics tool. AccessData's FTK suite is the premier software package for computer forensic analysis. All InfoSec Institute students have the option of including FTK 2.0 with their student registration after 1/1/2008. Contact us for more details about this program.

Total Access to Live Recorded Computer Forensics Lectures:
InfoSec Institute's Computer Forensics class is structured for maximum retention of knowledge learned in class. Because we believe in a commitment to your ongoing education after you attend a hands-on Computer Forensics class, InfoSec Institute makes available for every student access to all of the Live Recorded lectures you attended in-class. These are available in online format for 30 days after the training session!

.....................................................................................

Prepare Yourself For Up To 3 Computer Forensics Certifications:
This Computer Forensics training course prepares you for up to 3 industry recognized computer forensics certifications. As a vendor neutral training provider, InfoSec Institute has recognized that many students require more than one computer forensics certification. During the training class, you will be prepared to take:

  • IACRB's Certified Computer Forensics Examiner (CCFE) Certification
  • EC-Council's Certified Hacking Forensics Investigator (CHFI) Certification
  • ISFCE's Certified Computer Examiner (CCE) Certification

The CCFE and CHFI certifications can be taken in class on the last day of the training course. The CCE certification is available only in take home format for all test takers world wide.

Total Hands-On Lab Environment in Computer Forensics Training:

This Computer Forensics training neatly meshes the skills required in order to respond to security incidents:
Network Security Courses
  • Computer Forensics Training with open source tools
  • Overview of Computer Crime
  • Preparing sterile examination media
  • Acquisition, collection and seizure of magnetic media.
  • Recovering deleted data from a cell phone
  • Digital Camera Computer Forensics
  • PDA Computer Forensics
  • Documenting a "Chain of Custody"
  • Understanding Microsoft Windows from a forensics point of view
  • Working with NTFS
  • Combing Partition table and boot record
  • Investigating The Master File Table (MFT)
  • Linux/Unix computer forensics
  • Investigating data streams
  • File storage dates and times
  • File deletion/recovery
  • Recovering Internet Usage Data
  • Recovering: Swap Files/Temporary Files/Cache Files
  • Preservation and safe handling of original media
  • Making bitstream copies of original media
  • Common data hiding techniques
  • Examining CD-ROM media
  • Carving out files "hidden" in unallocated disk space
  • Word document forensics and password cracking
  • Issues when presenting data in court
  • The marking, storage and transmittal of evidence.
  • Use tools such as Encase Forensic Edition, X-Ways Forensic Addition, Forensic TookKit (FTK), Linux dd, etc.

What's Included:

  • Many course package options include a full license of AccessData's FTK 2.0 enterprise forensic suite.
  • This computer forensics class can be attended in either a 3 or 5 day format.
  • 5 Days of Expert Security Training Instruction (from a computer forensics instructor with real-world computer forensics training experience and deep knowledge of course content.
  • Guaranteed small class size, you get an intimate learning setting not offered at any of our computer forensics competitors.
  • Boot camp style training --- our instructors teach from 8am to 10:30pm every day. Course runs from 8am to 5pm daily with optional computer forensics training exercises to10:30pm.
  • All meals, snacks and refreshments included.
  • CCFE computer forensics certification fees included, CHFI & CCE exam vouchers available
  • Lecture, Lab Exercise and Text book --- Train your ethical friends and co-workers
  • InfoSec's Custom Computer Forensics Enterprise Suite, includes every program covered in the course for at home study. Computer Forensics Enterprise Suite available for individual purchase for only $1,499!

Required Prerequisites:

  • Firm understanding of the Windows Operating System
  • Attendees can be anyone involved in the security of information assets: information security officers and managers, network administrators, Windows administrators.
  • Desire for computer forensics training

No comments:

Post a Comment