2
Unit 12 Grange Road Office Park, Rathfarnham, Dublin 16, Ireland. Tel: +353 1 685 4942 Fax: +353 1 685 4273 www.digicore.ie, email: [email protected] The CFIP training course and associated examination is a 3 day, highly technical and hands-on course which provides delegates with the opportunity to develop expertise in the field of forensic analysis. Using a practical scenario, delegates will be guided through the process of conducting a forensic investigation and will learn the principles surrounding the collection of evidence, together with the forensic tools associated with forensic analysis. What you will learn • The principles and guidelines for computer forensic investigations • The process of evidence continuity • The fundamentals of the complete forensic investigation process • The forensic acquisition of an electronic device • How to store data on electronic media • How to work with key forensic investigation products • How to identify Windows based OS forensic artefacts Course content highlights ELECTRONIC DATA • Learn how data is stored to electronic devices • Analyse the functionality of a computer file system HARDWARE AND SOFTWARE • Addressing hardware employed during a forensic investigation • Familiarisation with forensic software INVESTIGATING WINDOWS ARTEFACTS • Function, structure and operation of the Windows registry • Internet history • Encryption • Recycle bins Forensic Investigation: Hands-on To Book Call: +353 1 685 4942 Duration: 3 days Cost: 1600.00 Gain an understanding of computer forensics analysis by learning about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation MSc Credits: 15 CPE Credits: 24 T E C O M P U T E R S E C U R I T Y A N D F O R E N S I C S M A S T E R O F S C I E N C E D C E R T I F I E D F O R E N S I C I N V E S T I G A T I O N P R A C T I T I O N E R C O M P U T E R F O R E N S I C S CFIP 3.0.1

CMI CFIP Forensic Investigation: Hands-on

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CMI CFIP Forensic Investigation: Hands-on

Unit 12 Grange Road Office Park, Rathfarnham, Dublin 16, Ireland. Tel: +353 1 685 4942 Fax: +353 1 685 4273 www.digicore.ie, email: [email protected]

The CFIP training course and associated

examination is a 3 day, highly technical

and hands-on course which provides

delegates with the opportunity to

develop expertise in the field of forensic

analysis.

Using a practical scenario, delegates will be guided

through the process of conducting a forensic

investigation and will learn the principles surrounding

the collection of evidence, together with the forensic

tools associated with forensic analysis.

What you will learn

• The principles and guidelines for computer forensic

investigations

• The process of evidence continuity

• The fundamentals of the complete forensic

investigation process

• The forensic acquisition of an electronic device

• How to store data on electronic media

• How to work with key forensic investigation products

• How to identify Windows based OS forensic artefacts

Course content highlights

ELECTRONIC DATA

• Learn how data is stored to electronic devices

• Analyse the functionality of a computer file system

HARDWARE AND SOFTWARE

• Addressing hardware employed during a forensic

investigation

• Familiarisation with forensic software

INVESTIGATING WINDOWS ARTEFACTS

• Function, structure and operation of the Windows

registry

• Internet history

• Encryption

• Recycle bins

Forensic Investigation: Hands-on

To Book Call:

+353 1 685 4942Duration: 3 daysCost: €1600.00

Gain an understanding of computer forensics analysis by learning

about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation

MSc Credits: 15CPE Credits: 24

CER

TIF

IED

SECURITY INCIDENT SPEC

IALIST

CE

RT

I FI E

D

M A LWA R E I N V E S TI G

AT

OR

CER

TIFI

ED F

ORE

NSIC INVESTIGATION PRACTITIO

NER

CE

RT

I FI E

D M

AC F O R E N S I C S S P ECI A

LIS

T

COMPUTER FORENSIC

S

COMPUTER FORENSIC

S

COMPUTER FORENSICS

PAYM

ENT

CAR

D INDUSTRY DATA SECURITY STA

ND

AR

D

I M P L E M E N T A T I O N

• • CMI

• • CFIP

• • CSIS

#>ssh_

• •

0000 0000 0000 0000PCI DSS

COMPUTER SECURITY

• •

SEC

UR

E C

O

D ING F O R WE B D

EVELO

PE

RS

1<?php

2 mysql_connect:

3

COMPUTER FORENSIC

S

• • CMFS

COMPUTER SECURITY

• •

CER

TIFI

ED IS

O 27

001 IMPLEMENTATION PRACTITIO

NER

C I IP

•C

ER

TIF

I ED

S E C U R I T Y T E S T I N

GA

SS

OC

IAT

E•

•C

ER

TIF

IED

INFR

ASTRU C T URE SEC

UR

ITY

TE

ST

ER•

•C

ER

TIF

IED

SE

CUR ITY TE ST ING

PROFE

SS

I ON

AL•

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

•C

ER

TIF

IED

A

PPL IC AT IO N SECURITY

TE

ST

ER•

GILL SANS REGULAR

ETH ICAL HACKING

• •CWSA

CER

TIF

IED

WIRELESS SECURITY

AN

ALY

ST

CO

MP

UT

E R

SE C U R I T Y A N D FO

RE

NS

ICS

M

A ST E R O F S C I ENCE

• •

•C

ER

TIF

I ED

S E C U R I T Y T E S T I N

GA

SS

OC

IAT

E• •

CE

RT

IFIE

DSE

CUR ITY TE ST ING

PROFE

SS

I ON

AL•

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

•C

ER

TIF

IED

A

PPL IC AT IO N SECURITY

TE

ST

ER•

CER

TIF

IED

SECURITY INCIDENT SPEC

IALIST

CE

RT

I FI E

D

M A LWA R E I N V E S TI G

AT

OR

CER

TIFI

ED F

ORE

NSIC INVESTIGATION PRACTITIO

NER

CE

RT

I FI E

D M

AC F O R E N S I C S S P ECI A

LIS

T

COMPUTER FORENSIC

S

COMPUTER FORENSIC

S

COMPUTER FORENSICS

PAYM

ENT

CAR

D INDUSTRY DATA SECURITY STA

ND

AR

D

I M P L E M E N T A T I O N

• • CMI

• • CFIP

• • CSIS

#>ssh_

• •

0000 0000 0000 0000PCI DSS

COMPUTER SECURITY

• •

SEC

UR

E C

O

D ING F O R WE B D

EVELO

PE

RS

1<?php

2 mysql_connect:

3

COMPUTER FORENSIC

S

• • CMFS

COMPUTER SECURITY

• •

CER

TIFI

ED IS

O 27

001 IMPLEMENTATION PRACTITIO

NER

C I IP

•C

ER

TIF

I ED

S E C U R I T Y T E S T I N

GA

SS

OC

IAT

E•

•C

ER

TIF

IED

INFR

ASTRU C T URE SEC

UR

ITY

TE

ST

ER•

•C

ER

TIF

IED

SE

CUR ITY TE ST ING

PROFE

SS

I ON

AL•

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

•C

ER

TIF

IED

A

PPL IC AT IO N SECURITY

TE

ST

ER•

GILL SANS REGULAR

ETH ICAL HACKING

• •CWSA

CER

TIF

IED

WIRELESS SECURITY

AN

ALY

ST

CO

MP

UT

E R

SE C U R I T Y A N D FO

RE

NS

ICS

M

A ST E R O F S C I ENCE

• •

•C

ER

TIF

I ED

S E C U R I T Y T E S T I N

GA

SS

OC

IAT

E• •

CE

RT

IFIE

DSE

CUR ITY TE ST ING

PROFE

SS

I ON

AL•

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

•C

ER

TIF

IED

A

PPL IC AT IO N SECURITY

TE

ST

ER•

3.0.

1

Page 2: CMI CFIP Forensic Investigation: Hands-on

Unit 12 Grange Road Office Park, Rathfarnham, Dublin 16, Ireland. Tel: +353 1 685 4942 Fax: +353 1 685 4273 www.digicore.ie, email: [email protected]

CER

TIF

IED

SECURITY INCIDENT SPEC

IALIST

CE

RT

I FI E

D

M A LWA R E I N V E S TI G

AT

OR

CER

TIFI

ED F

ORE

NSIC INVESTIGATION PRACTITIO

NER

CE

RT

I FI E

D M

AC F O R E N S I C S S P ECI A

LIS

T

COMPUTER FORENSIC

S

COMPUTER FORENSIC

S

COMPUTER FORENSICS

PAYM

ENT

CAR

D INDUSTRY DATA SECURITY STA

ND

AR

D

I M P L E M E N T A T I O N

• • CMI

• • CFIP

• • CSIS

#>ssh_

• •

0000 0000 0000 0000PCI DSS

COMPUTER SECURITY

• •

SEC

UR

E C

O

D ING F O R WE B D

EVELO

PE

RS

1<?php

2 mysql_connect:

3

COMPUTER FORENSIC

S

• • CMFS

COMPUTER SECURITY

• •

CER

TIFI

ED IS

O 27

001 IMPLEMENTATION PRACTITIO

NER

C I IP

•C

ER

TIF

I ED

S E C U R I T Y T E S T I N

GA

SS

OC

IAT

E•

•C

ER

TIF

IED

INFR

ASTRU C T URE SEC

UR

ITY

TE

ST

ER•

•C

ER

TIF

IED

SE

CUR ITY TE ST ING

PROFE

SS

I ON

AL•

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

•C

ER

TIF

IED

A

PPL IC AT IO N SECURITY

TE

ST

ER•

GILL SANS REGULAR

ETH ICAL HACKING

• •CWSA

CER

TIF

IED

WIRELESS SECURITY

AN

ALY

ST

CO

MP

UT

E R

SE C U R I T Y A N D FO

RE

NS

ICS

M

A ST E R O F S C I ENCE

• •

•C

ER

TIF

I ED

S E C U R I T Y T E S T I N

GA

SS

OC

IAT

E• •

CE

RT

IFIE

DSE

CUR ITY TE ST ING

PROFE

SS

I ON

AL•

ETH ICAL HACKING

ETH ICAL HACKING

ETH ICAL HACKING

•C

ER

TIF

IED

A

PPL IC AT IO N SECURITY

TE

ST

ER•

REPORTING

• Collating results

• Contents and layout of forensic repor ts

Who should attend

Those responsible or eager to become responsible

for computer forensic investigation, including:

• Forensic & Network Investigators

• IT Security Officers

• Law Enforcement Officials

• Crime Prevention Officers

Prerequisites

• Experience with Microsoft Windows

• General appreciation of forensic principles,

practices and software desirable

Benefits of training with 7Safe

• Highly technical, hands-on approach

• State-of-the-ar t classroom environment

• Resource pack containing course materials provided

free of charge

• Training delivered by practising consultants, which

guarantees a continually revised, real-world

educative content

• Earn an industry-recognised qualification upon

successful completion of the course examination

Career and organizational benefits

• Equip your organisation with the skill sets required

to gather evidence in a forensically sound manner

• Apply knowledge and skills from this course in

your working practice to enable your company to

conduct internal investigations

• Collect and analyse evidence using techniques

recognized by the cour ts of law

• Improve your personal profile by attaining an

industry-recognised and university-accredited

qualification

• Gain demonstrable exper tise in the specialist area

of forensic investigation

Professional Training Authored By Experts