Computer Forensics Techniques and Tools
Details
- Computer Forensics Objective and Need
- Cyber Crime
- Web Applications and Webservers Attacks
- Email Attacks
- Network Attacks
- Forensics on Mobile Devices
- Cyber Crime Investigation
- Reporting a Cyber Crime
Outline
Forensic Science
- Computer Forensics Objective and Need
- Cyber Crime
- Web Applications and Webservers Attacks
- Email Attacks
- Network Attacks
- Forensics on Mobile Devices
- Cyber Crime Investigation
- Reporting a Cyber Crime
- Expert Witness
Regulations, Policies and Ethics
- Searching and Seizing Computers with and without a Warrant
- Laws and Acts against Email Crimes
- Laws pertaining to Log Management
- Pertaining to Mobile Forensics
- General Ethics while Testifying
Digital Evidence
- Introduction to Digital Evidence and types
- Rules of Evidence
- Electronic Evidence: Types and Collecting Potential Evidence
- Electronic Crime and Digital Evidence Consideration by Crime Category
- Computer Forensics Lab
- Understanding Hard Disks
- Disk Partitions and Boot Process
- Understanding File Systems (Windows | Linux | Mac OS X)
- File Carving
- Image Files
- Analyze Logs
- Database Forensics
- Email Headers and Analysis
- Malware Analysis
- Mobile Operating Systems
Procedures and Methodology
- Investigating Computer Crime
- Computer Forensics Investigation Methodology
- Digital Evidence Examination Process
- Encryption
- First Responder
- First Response Basics
- Roles of First Responder
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Log Management and Event Correlation
- Network Forensics (IDSs)
- Computer Forensics Reports and Investigative Report Writing
Digital Forensics
- Recover Data (Deleted Files & Partitions)
- Filesystem Analysis
- Operating Systems Forensics (Windows | Linux | Mac)
- Steganography and Image File Forensics
- Steganalysis
- Investigating and Analyzing Logs
- Investigating Network Traffic
- Web Attack Investigation
- Investigating Email Crime and Violation
- Mobile Forensic Process
- Cloud Forensics
- Malware Forensics
- Tools/ Systems/ Programs
- First Responder Toolkit
- Windows Forensic Tools (Helix3 Pro, X-Ways Forensics, Windows Forensic Toolchest (WFT), Autopsy, The Sleuth Kit (TSK), etc.)
- Data Acquisition Software Tools (UltraKit Forensic Falcon, etc.)
- Tools to defeat Anti-Forensics
- Steganography Tools
- Database Forensics Tools
- Password Cracking Tools
- Network Forensics Tools
Speaker/s
Special Offer
Schedules
Tue, Fri | 09:00 AM — 04:00 PM |
No. of Days: | 4 |
Alpha Partners is a reputable firm of Training and Management Consultants with many years of corporate training experience in Finance, Accounting, Auditing, Banking, Management, Information Technology, Oil and Gas Sector, Security, Engineering, Public Relations, Secretarial Studies, Leadership, Marketing and other fields of human endeavour.
We are one of the leading players in the profession. Our firm, a multi-disciplinary one with highly talented, experienced and dedicated partners and staff who have experiences in different facets of working life was established in 1996 and has branches in Lagos, Enugu and Awka.
We offer a wide range of professional services, which covers audits, accounting, finance, taxation, ICT, security, engineering, insurance, human resources management, secretarial and consultancy services in all ramifications.
Our numerous clients attest to the high quality services we offer which contribute in no small measure in ensuring sound and efficient management of their resources.