cmi cfip forensic investigation: hands-on
TRANSCRIPT
Unit 12 Grange Road Office Park, Rathfarnham, Dublin 16, Ireland. Tel: +353 1 685 4942 Fax: +353 1 685 4273 www.digicore.ie, email: [email protected]
The CFIP training course and associated
examination is a 3 day, highly technical
and hands-on course which provides
delegates with the opportunity to
develop expertise in the field of forensic
analysis.
Using a practical scenario, delegates will be guided
through the process of conducting a forensic
investigation and will learn the principles surrounding
the collection of evidence, together with the forensic
tools associated with forensic analysis.
What you will learn
• The principles and guidelines for computer forensic
investigations
• The process of evidence continuity
• The fundamentals of the complete forensic
investigation process
• The forensic acquisition of an electronic device
• How to store data on electronic media
• How to work with key forensic investigation products
• How to identify Windows based OS forensic artefacts
Course content highlights
ELECTRONIC DATA
• Learn how data is stored to electronic devices
• Analyse the functionality of a computer file system
HARDWARE AND SOFTWARE
• Addressing hardware employed during a forensic
investigation
• Familiarisation with forensic software
INVESTIGATING WINDOWS ARTEFACTS
• Function, structure and operation of the Windows
registry
• Internet history
• Encryption
• Recycle bins
Forensic Investigation: Hands-on
To Book Call:
+353 1 685 4942Duration: 3 daysCost: €1600.00
Gain an understanding of computer forensics analysis by learning
about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation
MSc Credits: 15CPE Credits: 24
CER
TIF
IED
SECURITY INCIDENT SPEC
IALIST
CE
RT
I FI E
D
M A LWA R E I N V E S TI G
AT
OR
CER
TIFI
ED F
ORE
NSIC INVESTIGATION PRACTITIO
NER
CE
RT
I FI E
D M
AC F O R E N S I C S S P ECI A
LIS
T
COMPUTER FORENSIC
S
COMPUTER FORENSIC
S
COMPUTER FORENSICS
PAYM
ENT
CAR
D INDUSTRY DATA SECURITY STA
ND
AR
D
I M P L E M E N T A T I O N
• • CMI
• • CFIP
• • CSIS
#>ssh_
• •
0000 0000 0000 0000PCI DSS
COMPUTER SECURITY
• •
SEC
UR
E C
O
D ING F O R WE B D
EVELO
PE
RS
1<?php
2 mysql_connect:
3
COMPUTER FORENSIC
S
• • CMFS
COMPUTER SECURITY
• •
CER
TIFI
ED IS
O 27
001 IMPLEMENTATION PRACTITIO
NER
C I IP
•C
ER
TIF
I ED
S E C U R I T Y T E S T I N
GA
SS
OC
IAT
E•
•C
ER
TIF
IED
INFR
ASTRU C T URE SEC
UR
ITY
TE
ST
ER•
•C
ER
TIF
IED
SE
CUR ITY TE ST ING
PROFE
SS
I ON
AL•
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
•C
ER
TIF
IED
A
PPL IC AT IO N SECURITY
TE
ST
ER•
GILL SANS REGULAR
ETH ICAL HACKING
• •CWSA
CER
TIF
IED
WIRELESS SECURITY
AN
ALY
ST
CO
MP
UT
E R
SE C U R I T Y A N D FO
RE
NS
ICS
M
A ST E R O F S C I ENCE
• •
•C
ER
TIF
I ED
S E C U R I T Y T E S T I N
GA
SS
OC
IAT
E• •
CE
RT
IFIE
DSE
CUR ITY TE ST ING
PROFE
SS
I ON
AL•
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
•C
ER
TIF
IED
A
PPL IC AT IO N SECURITY
TE
ST
ER•
CER
TIF
IED
SECURITY INCIDENT SPEC
IALIST
CE
RT
I FI E
D
M A LWA R E I N V E S TI G
AT
OR
CER
TIFI
ED F
ORE
NSIC INVESTIGATION PRACTITIO
NER
CE
RT
I FI E
D M
AC F O R E N S I C S S P ECI A
LIS
T
COMPUTER FORENSIC
S
COMPUTER FORENSIC
S
COMPUTER FORENSICS
PAYM
ENT
CAR
D INDUSTRY DATA SECURITY STA
ND
AR
D
I M P L E M E N T A T I O N
• • CMI
• • CFIP
• • CSIS
#>ssh_
• •
0000 0000 0000 0000PCI DSS
COMPUTER SECURITY
• •
SEC
UR
E C
O
D ING F O R WE B D
EVELO
PE
RS
1<?php
2 mysql_connect:
3
COMPUTER FORENSIC
S
• • CMFS
COMPUTER SECURITY
• •
CER
TIFI
ED IS
O 27
001 IMPLEMENTATION PRACTITIO
NER
C I IP
•C
ER
TIF
I ED
S E C U R I T Y T E S T I N
GA
SS
OC
IAT
E•
•C
ER
TIF
IED
INFR
ASTRU C T URE SEC
UR
ITY
TE
ST
ER•
•C
ER
TIF
IED
SE
CUR ITY TE ST ING
PROFE
SS
I ON
AL•
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
•C
ER
TIF
IED
A
PPL IC AT IO N SECURITY
TE
ST
ER•
GILL SANS REGULAR
ETH ICAL HACKING
• •CWSA
CER
TIF
IED
WIRELESS SECURITY
AN
ALY
ST
CO
MP
UT
E R
SE C U R I T Y A N D FO
RE
NS
ICS
M
A ST E R O F S C I ENCE
• •
•C
ER
TIF
I ED
S E C U R I T Y T E S T I N
GA
SS
OC
IAT
E• •
CE
RT
IFIE
DSE
CUR ITY TE ST ING
PROFE
SS
I ON
AL•
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
•C
ER
TIF
IED
A
PPL IC AT IO N SECURITY
TE
ST
ER•
3.0.
1
Unit 12 Grange Road Office Park, Rathfarnham, Dublin 16, Ireland. Tel: +353 1 685 4942 Fax: +353 1 685 4273 www.digicore.ie, email: [email protected]
CER
TIF
IED
SECURITY INCIDENT SPEC
IALIST
CE
RT
I FI E
D
M A LWA R E I N V E S TI G
AT
OR
CER
TIFI
ED F
ORE
NSIC INVESTIGATION PRACTITIO
NER
CE
RT
I FI E
D M
AC F O R E N S I C S S P ECI A
LIS
T
COMPUTER FORENSIC
S
COMPUTER FORENSIC
S
COMPUTER FORENSICS
PAYM
ENT
CAR
D INDUSTRY DATA SECURITY STA
ND
AR
D
I M P L E M E N T A T I O N
• • CMI
• • CFIP
• • CSIS
#>ssh_
• •
0000 0000 0000 0000PCI DSS
COMPUTER SECURITY
• •
SEC
UR
E C
O
D ING F O R WE B D
EVELO
PE
RS
1<?php
2 mysql_connect:
3
COMPUTER FORENSIC
S
• • CMFS
COMPUTER SECURITY
• •
CER
TIFI
ED IS
O 27
001 IMPLEMENTATION PRACTITIO
NER
C I IP
•C
ER
TIF
I ED
S E C U R I T Y T E S T I N
GA
SS
OC
IAT
E•
•C
ER
TIF
IED
INFR
ASTRU C T URE SEC
UR
ITY
TE
ST
ER•
•C
ER
TIF
IED
SE
CUR ITY TE ST ING
PROFE
SS
I ON
AL•
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
•C
ER
TIF
IED
A
PPL IC AT IO N SECURITY
TE
ST
ER•
GILL SANS REGULAR
ETH ICAL HACKING
• •CWSA
CER
TIF
IED
WIRELESS SECURITY
AN
ALY
ST
CO
MP
UT
E R
SE C U R I T Y A N D FO
RE
NS
ICS
M
A ST E R O F S C I ENCE
• •
•C
ER
TIF
I ED
S E C U R I T Y T E S T I N
GA
SS
OC
IAT
E• •
CE
RT
IFIE
DSE
CUR ITY TE ST ING
PROFE
SS
I ON
AL•
ETH ICAL HACKING
ETH ICAL HACKING
ETH ICAL HACKING
•C
ER
TIF
IED
A
PPL IC AT IO N SECURITY
TE
ST
ER•
REPORTING
• Collating results
• Contents and layout of forensic repor ts
Who should attend
Those responsible or eager to become responsible
for computer forensic investigation, including:
• Forensic & Network Investigators
• IT Security Officers
• Law Enforcement Officials
• Crime Prevention Officers
Prerequisites
• Experience with Microsoft Windows
• General appreciation of forensic principles,
practices and software desirable
Benefits of training with 7Safe
• Highly technical, hands-on approach
• State-of-the-ar t classroom environment
• Resource pack containing course materials provided
free of charge
• Training delivered by practising consultants, which
guarantees a continually revised, real-world
educative content
• Earn an industry-recognised qualification upon
successful completion of the course examination
Career and organizational benefits
• Equip your organisation with the skill sets required
to gather evidence in a forensically sound manner
• Apply knowledge and skills from this course in
your working practice to enable your company to
conduct internal investigations
• Collect and analyse evidence using techniques
recognized by the cour ts of law
• Improve your personal profile by attaining an
industry-recognised and university-accredited
qualification
• Gain demonstrable exper tise in the specialist area
of forensic investigation
Professional Training Authored By Experts