Computer Forensics

Course:  FOREN1
Duration:  3 Days
Level:  I
Course Summary

Internet crime is on the rise, catapulting the need for computer forensics specialists. This course presents you with an up-to-date overview of the basic skills that are required as a computer forensics professional and introduces the latest software and tools that exist. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks.

« Hide The Details
Topics Covered In This Course

The Need for Computer Forensics

  • Defining Computer Forensics
  • Computer Crime in Real Life
  • Corporate versus Law Enforcement Concerns
  • Training

Preparation?What to Do Before You Start

  • Know Your Hardware
  • Know Your Operating System
  • Know Your Limits
  • Develop Your Incident Response Team

Computer Evidence

  • What Is Computer Evidence?
  • Search and Seizure
  • Chain of Custody
  • Admissibility of Evidence in a Court of Law
  • Leave No Trace

Common Tasks

  • Evidence Identification
  • Evidence Preservation
  • Evidence Analysis
  • Evidence Presentation

Capturing the Data Image

  • The Imaging Process
  • Partial Volume Images
  • Working with Virtual Machines
  • Imaging/Capture Tools

Extracting Information from Data

  • What Are You Looking For?
  • How People Think
  • Picking the Low-Hanging Fruit
  • Hidden Evidence
  • Trace Evidence

Passwords and Encryption

  • Passwords
  • Encryption Basics
  • Common Encryption Practices
  • Strengths and Weaknesses of Encryption
  • Handling Encrypted Data

Common Forensic Tools

  • Disk Imaging and Validation Tool
  • Forensic Tools
  • Your Forensic Toolkit

Pulling It All Together

  • Creating Easy-to-Use Reports
  • Document Everything, Assume Nothing
  • Formulating the Report
  • Sample Analysis Reports
  • Using Software to Generate Reports

How to Testify in Court

  • Preparation Is Everything
  • Appearance Matters
  • What Matters Is What They Hear
  • Know Your Forensic Process and Tools
  • Say Only What You Must
  • Keep It Simple
  • Be Ready to Justify Every Step
What You Can Expect

In this course, you will learn how to?

  • conduct a computer forensics investigation
  • find hidden data, capture images, document your case, and present evidence in court as an expert witness
  • identify, collect, and preserve computer evidence
  • understand encryption and examine encryption files
Who Should Take This Course

IT Administrators that need to enhance their skills in computer forensics to enable them to better deal with cyber crime.

Recommended Prerequisites

Sound general IT administration knowledge.

Training Style

Instructor led with lecture, discussion and exercises.

« Hide The Details
Related Courses
Code Course Title Duration Level
AUDITE
Essential Audit Skills
5 Days
I
Details
SMAC
Security Management and Control (Deployment/Maintenance of Confidential Data)
5 Days
I
Details
CISA
Certified Information Systems Auditor
5 Days
II
Details

Every student attending a Verhoef Training class will receive a certificate good for $100 toward their next public class taken within a year.

You can also buy "Verhoef Vouchers" to get a discounted rate for a single student in any of our public or web-based classes. Contact your account manager or our sales office for details.

Schedule For This Course
There are currently no public sessions scheduled for this course. We can schedule a private class for your organization just a couple of weeks from now. Or we can let you know the next time we do schedule a public session.
Notify me the next time this course is confirmed!
Can't find the course you want?
Call us at 800.533.3893, or
email us at [email protected]