Computer Forensics Techniques and Tools

  • Start Date

    29 Nov, 2021

  • End Date

    03 Dec, 2021

  • Price

    $5,000

  • WiFi

    Free wifi

Event Details

Computer Forensics Techniques and Tools workshop offers to participants the skills and knowledge to identify an intruder's footprints and to properly gather the necessary evidence to prosecute in the court of law. It covers investigating intrusion on computers/ computing devices, applications, websites and networks.

 

CONTENT

Forensic Science

  • Computer Forensics Objective and Need
  • Cyber Crime
  • Web Applications and Webservers Attacks
  • Email Attacks
  • Network Attacks
  • Forensics on Mobile Devices
  • Cyber Crime Investigation
  • Reporting a Cyber Crime
  • Expert Witness

Regulations, Policies and Ethics

  • Searching and Seizing Computers with and without a Warrant
  • Laws and Acts against Email Crimes
  • Laws pertaining to Log Management
  • Pertaining to Mobile Forensics
  • General Ethics while Testifying

Digital Evidence

  • Introduction to Digital Evidence and types
  • Rules of Evidence
  • Electronic Evidence: Types and Collecting Potential Evidence
  • Electronic Crime and Digital Evidence Consideration by Crime Category
  • Computer Forensics Lab
  • Understanding Hard Disks
  • Disk Partitions and Boot Process
  • Understanding File Systems (Windows | Linux | Mac OS X)
  • File Carving
  • Image Files
  • Analyze Logs
  • Database Forensics
  • Email Headers and Analysis
  • Malware Analysis
  • Mobile Operating Systems

Procedures and Methodology

  • Investigating Computer Crime
  • Computer Forensics Investigation Methodology
  • Digital Evidence Examination Process
  • Encryption
  • First Responder
  • First Response Basics
  • Roles of First Responder
  • Data Acquisition and Duplication
  • Defeating Anti-Forensics Techniques
  • Log Management and Event Correlation
  • Network Forensics (IDSs)
  • Computer Forensics Reports and Investigative Report Writing

Digital Forensics

  • Recover Data (Deleted Files & Partitions)
  • Filesystem Analysis
  • Operating Systems Forensics (Windows | Linux | Mac)
  • Steganography and Image File Forensics
  • Steganalysis
  • Investigating and Analyzing Logs
  • Investigating Network Traffic
  • Web Attack Investigation
  • Investigating Email Crime and Violation
  • Mobile Forensic Process
  • Cloud Forensics
  • Malware Forensics
  • Tools/ Systems/ Programs
  • First Responder Toolkit
  • Windows Forensic Tools (Helix3 Pro, X-Ways Forensics, Windows Forensic Toolchest (WFT), Autopsy, The Sleuth Kit (TSK), etc.)
  • Data Acquisition Software Tools (UltraKit Forensic Falcon, etc.)
  • Tools to defeat Anti-Forensics
  • Steganography Tools
  • Database Forensics Tools
  • Password Cracking Tools
  • Network Forensics Tools

 

FOR WHOM:

CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

1ST BATCH:       21st – 25th June, 2021

2ND BATCH:      29th Nov – 3rd Dec, 2021

Other Dates

Start Date End Date
21 Jun, 2021 25 Jun, 2021
Start Date End Date
29 Nov, 2021 03 Dec, 2021
  • Venue

    Arabian Courtyard Hotel, Dubai, United Arab Emirates.

Share this course