We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?


Computer Forensics Techniques and Tools


Forensic Science

  • Computer Forensics Objective and Need
  • Cyber Crime
  • Web Applications and Webservers Attacks
  • Email Attacks
  • Network Attacks
  • Forensics on Mobile Devices
  • Cyber Crime Investigation
  • Reporting a Cyber Crime
  • Expert Witness

Regulations, Policies and Ethics

  • Searching and Seizing Computers with and without a Warrant
  • Laws and Acts against Email Crimes
  • Laws pertaining to Log Management
  • Pertaining to Mobile Forensics
  • General Ethics while Testifying

Digital Evidence

  • Introduction to Digital Evidence and types
  • Rules of Evidence
  • Electronic Evidence: Types and Collecting Potential Evidence
  • Electronic Crime and Digital Evidence Consideration by Crime Category
  • Computer Forensics Lab
  • Understanding Hard Disks
  • Disk Partitions and Boot Process
  • Understanding File Systems (Windows | Linux | Mac OS X)
  • File Carving
  • Image Files
  • Analyze Logs
  • Database Forensics
  • Email Headers and Analysis
  • Malware Analysis
  • Mobile Operating Systems

Procedures and Methodology

  • Investigating Computer Crime
  • Computer Forensics Investigation Methodology
  • Digital Evidence Examination Process
  • Encryption
  • First Responder
  • First Response Basics
  • Roles of First Responder
  • Data Acquisition and Duplication
  • Defeating Anti-Forensics Techniques
  • Log Management and Event Correlation
  • Network Forensics (IDSs)
  • Computer Forensics Reports and Investigative Report Writing

Digital Forensics

  • Recover Data (Deleted Files & Partitions)
  • Filesystem Analysis
  • Operating Systems Forensics (Windows | Linux | Mac)
  • Steganography and Image File Forensics
  • Steganalysis
  • Investigating and Analyzing Logs
  • Investigating Network Traffic
  • Web Attack Investigation
  • Investigating Email Crime and Violation
  • Mobile Forensic Process
  • Cloud Forensics
  • Malware Forensics
  • Tools/ Systems/ Programs
  • First Responder Toolkit
  • Windows Forensic Tools (Helix3 Pro, X-Ways Forensics, Windows Forensic Toolchest (WFT), Autopsy, The Sleuth Kit (TSK), etc.)
  • Data Acquisition Software Tools (UltraKit Forensic Falcon, etc.)
  • Tools to defeat Anti-Forensics
  • Steganography Tools
  • Database Forensics Tools
  • Password Cracking Tools
  • Network Forensics Tools


A distinguished team of facilitators who are eminently qualified professionals has been assembled to lead discussions in course of the workshop.

Special Offer

5% discount for 3-5 participants and 10% discount for 6 and above number of participants from the same organization.
Be the first to write a review about this course.
Write a Review

Alpha Partners is a reputable firm of Training and Management Consultants with many years of corporate training experience in Finance, Accounting, Auditing, Banking, Management, Information Technology, Oil and Gas Sector, Security, Engineering, Public Relations, Secretarial Studies, Leadership, Marketing and other fields of human endeavour.

We are one of the leading players in the profession. Our firm, a multi-disciplinary one with highly talented, experienced and dedicated partners and staff who have experiences in different facets of working life was established in 1996 and has branches in Lagos, Enugu and Awka.

We offer a wide range of professional services, which covers audits, accounting, finance, taxation, ICT, security, engineering, insurance, human resources management, secretarial and consultancy services in all ramifications.

Our numerous clients attest to the high quality services we offer which contribute in no small measure in ensuring sound and efficient management of their resources.

Alpha Partners Training
200, Murtala Muhammed Way (3rd Floor), Adekunle BRT Bus Stop, Yaba, Lagos. Nigeria., Yaba - Lagos, Nigeria
Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.