Computer Forensics Course

Course Description:

With today's fast-paced upgrades in technologies and its accessibility, the rate of abuse, fraud and downright criminal activity on computer networks by hackers, contractors and even employees are at an all time high. In order to help solve these issues, companies are bringing in computer forensic professionals to fight and solve these cyber crimes. This training covers the essential steps of the in-depth computer forensic methodology so that each student will have the adequate qualifications to work as a computer forensic investigator in the field helping solve and fight crime. This course also includes best practices of detecting hacking attacks and properly extracting evidence to report the incident and conduct audits to prevent future attacks.

Course Objectives:

Each participant should leave the class with a firm understanding of the following:

- Requisite technology relevant to forensic investigations
- Computer security risks and remedies
- Incident responses, priorities and team building requirements
- Preservation and Management of computer evidence
- Solid computer forensics processing methods and procedures
- Usage of Software Application Forensic Tools


Who Should Attend:


- IT Managers
- IT Auditors
- System Administrators
- Forensic Investigators
- Legal Professionals

Course Outline:

Introduction to Computer Forensics
- Overview to Computer Forensics
- Computer Flaws and Risks
- Cyber Crime
- Law and Computer Forensics
- Compter Forensics Preparation

Computer Investigation Process
- Methodologies
- Case Evaluation
- The Incident Response Team
- Laboratory Requirements
- Implementing and Investigation
- Evidence Management
- Case Closure and Evaluation

Hard Drives and System Files
- File Systems and Boot Sequences
- Disk Drive Overview
- Partitions, FAT, and NTFS Disks
- Windows System Files

Windows Forensics
- Locating and Gathering Evidence
- Examining File Systems and Registry
- Memory Dumps and Sytem State Backups
- Internet Traces
- Introduction to Linux and Mac Forensics

Data Recovery, Acquisition and Duplication
- Data Acquisition Methods
- Data Recovery Contingencies
- Commands Preservation
- Data Duplication
- Securing and Recovering Files

Image Files Forensics
- Image Files Overview
- Data Compression
- Location and Recovery of Image Files
- File Headers and Fragments
- Steganography

Password Cracking
- Applications
- Cracking Methods and Classification
- System Software Password Cracking
- Application Software Password Cracking

Investigating Networks and Logs
- Audit Logs and Security
- Remote Logging
- Examining Intrusion and Security Events
- Correlating Log Files
- Network Protocols
- Evidence Gathering
- Evidence Documentation

Web and Email Forensics
- Web Attacks
- Investigating Static and Dynamic IP Addresses
- DNS Poisoning, SQL Injections
- Log File Investigation
- Email Forensics

Investigative Reports
- Report Specifications and Classifications
- Report Writing and Layout
- Use of Supporting Material
- Report Formats

Duration: 3 days
Date:
January 12-14, 2011
Time: 9:00 am to 5:00 pm
Venue: CheQ Training Lab 1703 88 Corporate Center 141 Sedeno St. corner Valero St.,
Salcedo Village, Makati City Philippines 122
Course Fee: Php 16,800.00

Register Now!

Course fee is inclusive of handouts, certificate, snacks and lunch.  Please make all checks payable to Sequre Technologies, Inc.

Please bring your laptop.

For other details, please call 506-0248 or 0920-9490205 or email info@poshmarketingservices.com.

Cancellation of registration should be made seven working-days before the training date.  Otherwise, 50% of the training fee shall be charged.  No show during the training shall be charged 100% of the training fee.