Skip to main content

Computer Forensics Boot Camp Training

Code: 2075 Category: Tag:

Learn how to investigate cybercrime! This boot camp goes in-depth into the tools, techniques and processes used by forensics examiners to find and extract evidence from computers.

Infosec’s Computer Forensics Boot Camp teaches you how to identify, preserve, extract, analyze, and report forensic evidence on computers. You will learn about the challenges of computer forensics, walk through the process of analysis and examination of operating systems, and gain a deep understanding of differences in evidence locations and examination techniques on Windows and Linux computers.

More than 30 hands-on labs simulating a real cybercrime investigation provide you with practical experience using commercial and open- source forensic tools. The boot camp also prepares you to become a Certified Computer Forensics Examiner (CCFE).

Students must have no criminal record. Basic computer skills, including the ability or desire to work outside the Windows GUI interface, are necessary. A+ certification and/or similar training and experience is not required, but recommended.

This is a very in-depth training course and is not intended for individuals who have limited or no computer skills.

Law enforcement professionals looking to expand into computer crime investigations
Legal professionals
IT and information security professionals being tasked with corporate forensics and incident handling
Anyone with a desire to learn about computer forensics and develop their skills

Computer Forensics Boot Camp Training Delivery Methods
Official InfoSec course curriculum
30+ hands-on labs included
After-course instructor coaching included
Exam voucher included
Computer Forensics Boot Camp Training Course Benefits
Understand provisions of IT lawUnderstand complex technical forensics conceptsHow to apply forensics concepts to forensic investigationsHandle evidence (procedures and rules)Use a range of computer forensics toolsAcquire forensic evidenceLocate forensic artifacts in various operating systemsAnalyze extracted evidence » Properly reporting findingsTrack an offender on the internetWork with law enforcementDesign an incident response strategy
Computer Forensics Training Outline
Day 1
Course introduction
Computer forensics and investigation as a profession
Define computer forensics
Describe how to prepare for computer investigations and explain the difference between law enforcement agency and corporate investigations
Explain the importance of maintaining professional conduct
Digital evidence — legal issues
Identifying digital evidence
Evidence admissibility
Federal rules of evidence
Daubert standard
Discovery
Warrants
What is seizure?
Consent issues
Expert witness
Roles and responsibilities
Ethics
(ISC)²
AAFS
ISO
Investigations
Investigative process
Chain of custody
Incident response
E-discovery
Criminal vs. civil vs. administrative investigations
Intellectual property
Markman hearing
Reporting
Quality control
Lab and tool
Investigator
Examination
Standards
Evidence management
SOPS
Collection
Documentation
Preservation
Transport/tracking
Storage/access control
Disposition
Current computer forensics tools and hardware
Commercial
Free/open source
Day 2
Day 3
Day 4
Day 5

Request Quotes

Register now

Red Hat System Administration II (RH134)

Implementing Cisco Enterprise Wireless Networks (ENWLSI)

Excel Data Analysis Course

The Strategic Role of the Business Analyst

Cyber Security Success Factors Training

Nintex O365 Workflow Training

Introduction to SQL Training

Developing User Requirements Training: The Key to Project Success

Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub (AZ-600)

Introduction to Modeling for Business Analysis Training

arالعربية