Course details
Summary
This five-day intensive course enables the participants to develop the necessary expertise in mastering the computer forensics processes as specified in CLFE certification. Participants will gain a thorough understanding of fundamental computer forensics, based on the best practices used to implement the forensics evidence recovery and analytical processes. The CLFE certification focuses on core skills required to collect and analyze data from Windows, Mac OS X, Linux computer systems, as well as from mobile devices.
Learning objectives
- To ensure that the CLFE can protect him or herself against injury, threat to credibility and protect the integrity of the examined media throughout the computer forensics operation
- To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action to be followed in order to achieve the goal of the operation
- To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the presence of certain ports to the actual or eventual presence of a media containing information to be examined
- To ensure that the CLFE has a clear knowledge where the information can be found on an electronic media or bit-stream image of a media, it would be operating the systems or user information, actual deleted or hidden information
- To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence located on a network, in the cloud or in a virtual environment
- To ensure that the CLFE can conduct a basic, yet forensically sound examination of a cell phone or tablet
- To ensure that the CLFE can use efficiently the tools (software, hardware and supplies) of the field examination kit for a better goal achievement of the computer forensics operation
- To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and forensically sound manner
Day 1: Introduction to scientific principles of Computer Forensics operations
- Scientific principles of computer forensics
- Introduction to computer forensics process approach
- The analysis and implementation of the fundamental operations
- Preparation and execution of forensics procedures and operations
- Identification and selection of the characteristics of the computer structure
- Identification of peripherals and other components
- Understanding the operating systems
- Extraction and analysis of the file structure
- Understanding the network, cloud and virtual environments
- Generic methods for data examination in a virtual environment
- Examination of a cell phone or tablet
- Enumeration of cell phones and tablets needed for forensics examination
- Storage of information in mobile devices
- Enumeration and examination of the computer hardware and software
- Determination and testing of corrective measures
- Analysis and selection of the best procedures for computer forensics operation
- Discovery, documentation and return of the evidence on-site
- Analyzing and applying the contextual parameters
Educational approach
This training is based on both, theory and practice:
- Sessions of lectures illustrated with examples based on real cases
- Practical exercises
- Review exercises to assist the exam preparation
- Practice test similar to the certification exam
- To benefit from the practical exercises, the number of training participants is limited
The "PECB Certified Lead Forensics Examiner" exam fully meets the requirements of the PECB Examination and Certification Program (ECP). The exam covers the following competence domains:
Domain 1: Scientific Principles of computer forensics
Domain 2: Computer forensics operations fundamentals
Domain 3: Forensics: computer hardware structure
Domain 4: Forensics: operating systems and file structure
Domain 5: Forensics of network, cloud and virtual environments
Domain 6: Forensics of cell phones and tablets
Domain 7: Computer Forensics operation tools and software
Domain 8: Forensics: examination, acquisition and preservation of electronic evidence
The "PECB Certified Lead Forensics Examiner" exam is available in different languages ( the complete list of languages can be found in the examination application form)
Duration: 2 hours
For more information about the exam, refer to the PECB section on "PECB Certified Lead Forensics Examiner" Exam
A certificate will be issued to the participants who successfully pass the exam and comply with all the other requirements related to the selected credential
General information
Exam and certification fees are included in the training price
A student manual containing over 300 pages of information and practical examples will be distributed to the participants
A participation certificate of 21 CPD (Continuing Professional Development) credits will be issued to the participants
In case of failure of an exam, participants are allowed to retake the exam for free under certain conditions
Updated on 01 May, 2019
Eligibility / Requirements
Knowledge on Computer Forensics.
Job roles this course is suitable for:
Certified Computer Forensics ProfessionalCourse Location
About Fox Star Management Development and Training
VISION
Regional leadership in Organizational Development, Compliance and Accreditation of individual and Enterprises.
MISSION
Provision Best-In-Class services in field of Organizational Development, Individuals Professional Qualification, and Enterprises, and accreditation in accordance with the latest international standards and practices.
CORE VALUES
• Commitment to Quality
• Honesty
• Excellence
GOALS and OBJECTIVES
1. Promote for values, and principles of Organizational Development by providing Management Consultations that ensure compliance of enterprises with international standards and best practices, and spread the culture of Excellence in Governmental service at the regional level.
2. Provision of Management and Technical training courses to develop enterprise's’ staff skills and to support the career path development in a way to qualify them for international accreditations according to the latest international standards and specifications.
3. Provision assessment and accreditation services to individuals and enterprises in accordance with international standards.
4. Train and qualify security and military personnel in their areas of competence to assure it remains in align with modern standards in the field of security and military.
Networking and Security Related Questions
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Diploma in IT Security (Malware) Alpha AcademyAED 95
AED 1,028Duration: Upto 17 Hours - Computer Networks Security Scratch to Advanced Course CentralAED 85
AED 367Duration: Upto 8 Hours