Implementation Management of Computer Forensics Processes
السعر: 2,178 USD
4,356 USD
  • مدة الدورة التدريبية: 5 Days
  • مواعيد الدورة: Part Time, Flexible

    تفاصيل الدورة

    Summary

    This five-day intensive course enables the participants to develop the necessary expertise in mastering the computer forensics processes as specified in CLFE certification. Participants will gain a thorough understanding of fundamental computer forensics, based on the best practices used to implement the forensics evidence recovery and analytical processes. The CLFE certification focuses on core skills required to collect and analyze data from Windows, Mac OS X, Linux computer systems, as well as from mobile devices.

    Learning objectives
    1. To ensure that the CLFE can protect him or herself against injury, threat to credibility and protect the integrity of the examined media throughout the computer forensics operation
    2. To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action to be followed in order to achieve the goal of the operation
    3. To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the presence of certain ports to the actual or eventual presence of a media containing information to be examined
    4. To ensure that the CLFE has a clear knowledge where the information can be found on an electronic media or bit-stream image of a media, it would be operating the systems or user information, actual deleted or hidden information
    5. To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence located on a network, in the cloud or in a virtual environment
    6. To ensure that the CLFE can conduct a basic, yet forensically sound examination of a cell phone or tablet
    7. To ensure that the CLFE can use efficiently the tools (software, hardware and supplies) of the field examination kit for a better goal achievement of the computer forensics operation
    8. To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and forensically sound manner
    Course Agenda

    Day 1: Introduction to scientific principles of Computer Forensics operations
    1. Scientific principles of computer forensics
    2. Introduction to computer forensics process approach
    3. The analysis and implementation of the fundamental operations
    4. Preparation and execution of forensics procedures and operations
    Day 2: The computer and operating structure
    1. Identification and selection of the characteristics of the computer structure
    2. Identification of peripherals and other components
    3. Understanding the operating systems
    4. Extraction and analysis of the file structure
    Day 3: Forensics of networks and mobile devices
    1. Understanding the network, cloud and virtual environments
    2. Generic methods for data examination in a virtual environment
    3. Examination of a cell phone or tablet
    4. Enumeration of cell phones and tablets needed for forensics examination
    5. Storage of information in mobile devices
    Day 4: Computer Forensics tools and methodologies
    1. Enumeration and examination of the computer hardware and software
    2. Determination and testing of corrective measures
    3. Analysis and selection of the best procedures for computer forensics operation
    Day 5: Reporting
    1. Discovery, documentation and return of the evidence on-site
    2. Analyzing and applying the contextual parameters
     
      تحديث بتاريخ 01 December, 2020

    وظائف مناسبة لهذه الدورة

    Workforce demand for computer security specialists is high a... , including corporations , schools , medical practices , as well as public enterprises and government agencies.
    دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على Training ابتداءً من الآن. See all courses

    هل هذه الدورة التدريبية الاختيار المناسب لك؟

    لم تجد ما كنت تبحث عنه؟

    أو