Implementation Management of Computer Forensics Processes
السعر: 8,000 درهم
16,000 درهم
  • الموقع: ديرة - دبي
  • مدة الدورة التدريبية: 5 Days
  • مواعيد الدورة: Part Time, Flexible

تفاصيل الدورة

Summary

This five-day intensive course enables the participants to develop the necessary expertise in mastering the computer forensics processes as specified in CLFE certification. Participants will gain a thorough understanding of fundamental computer forensics, based on the best practices used to implement the forensics evidence recovery and analytical processes. The CLFE certification focuses on core skills required to collect and analyze data from Windows, Mac OS X, Linux computer systems, as well as from mobile devices.

Learning objectives
  1. To ensure that the CLFE can protect him or herself against injury, threat to credibility and protect the integrity of the examined media throughout the computer forensics operation
  2. To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action to be followed in order to achieve the goal of the operation
  3. To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the presence of certain ports to the actual or eventual presence of a media containing information to be examined
  4. To ensure that the CLFE has a clear knowledge where the information can be found on an electronic media or bit-stream image of a media, it would be operating the systems or user information, actual deleted or hidden information
  5. To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence located on a network, in the cloud or in a virtual environment
  6. To ensure that the CLFE can conduct a basic, yet forensically sound examination of a cell phone or tablet
  7. To ensure that the CLFE can use efficiently the tools (software, hardware and supplies) of the field examination kit for a better goal achievement of the computer forensics operation
  8. To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and forensically sound manner
Course Agenda

Day 1: Introduction to scientific principles of Computer Forensics operations
  1. Scientific principles of computer forensics
  2. Introduction to computer forensics process approach
  3. The analysis and implementation of the fundamental operations
  4. Preparation and execution of forensics procedures and operations
Day 2: The computer and operating structure
  1. Identification and selection of the characteristics of the computer structure
  2. Identification of peripherals and other components
  3. Understanding the operating systems
  4. Extraction and analysis of the file structure
Day 3: Forensics of networks and mobile devices
  1. Understanding the network, cloud and virtual environments
  2. Generic methods for data examination in a virtual environment
  3. Examination of a cell phone or tablet
  4. Enumeration of cell phones and tablets needed for forensics examination
  5. Storage of information in mobile devices
Day 4: Computer Forensics tools and methodologies
  1. Enumeration and examination of the computer hardware and software
  2. Determination and testing of corrective measures
  3. Analysis and selection of the best procedures for computer forensics operation
Day 5: Reporting
  1. Discovery, documentation and return of the evidence on-site
  2. Analyzing and applying the contextual parameters
 
  تحديث بتاريخ 01 December, 2020
دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على Training ابتداءً من الآن. See all courses

هل هذه الدورة التدريبية الاختيار المناسب لك؟

قيِم هذه الصفحة

لم تجد ما كنت تبحث عنه؟

أو