Professional Development
4

Other forthcoming dates

Book your training three months in advance of the course start date and get a 10% discount

Courses available in

  • 7Safe courses in england
  • 7Safe courses in ireland
  • 7Safe courses in cyprus
  • CPE Credits: 32
  • MSc credits: 15

CFIP Forensic Investigation: Hands-On

This 4 day practical digital forensics training course will enable you to gain an understanding of static computer forensics analysis by learning about forensic principles, evidence continuity and the methodology to employ when conducting a forensic investigation. The course content covers seizure, evidence handling and data preservation, through to investigation and interpretation and finally the reporting and presentation of findings.

What will you learn?

Using practical scenarios based on Windows 7 artefacts with the latest disk technologies, you will learn the following:

  • The principles and guidelines for computer forensic investigations
  • The process of evidence seizure and continuity
  • The forensic acquisition of an electronic device
    How data is stored on electronic media
    The core functionality of forensic examination software
    How to identify Windows based OS forensic artefacts.

The course will also provide answers to many questions including:

  • What skills and qualifications do I need to practice computer forensics?
  • How and where is data actually stored on a device?
  • What is the difference between forensic imaging and cloning?
  • Is keyword searching an effective way to identify data on a device?
  • How is hashing used in forensics?
  • What happens when a user deletes a file?
  • How can ‘Private’ web-browsing work?
  • Can data be recovered after a 7 pass overwrite?
  • Is there a backdoor to passwords and encryption?
  • Who was using a computer on a particular occasion?
  • How can I identify if and when a user edited or accessed a file?
  • Course content
    • Understand how data is stored to electronic devices
    • Disk partitioning using MBR and GPT
    • File Systems, focussing on NTFS
    • How to employ and understand methods of data reduction
    • Understanding dates, times and metadata
    • The evidential importance of the Windows registry
    • Determining if files have been opened and/or edited
    • Internet Explorer 10 web-browser history
    • Practical advice on the layout, content and phrasing of forensic reports.
  • Prerequisites
    • Experience with Microsoft Windows
    • General appreciation of forensic principles, practices and software desirable
  • Benefits
    • The principles and guidelines for computer forensic investigations
    • The process of evidence continuity
    • The fundamentals of the complete forensic investigation process
    • The forensic acquisition of an electronic devices
    • How to store data on electronic media
    • How to work with key forensic investigation products
    • How to identify Windows based OS forensic artefacts
  • Target Audience

    Those responsible or eager to become responsible for computer forensic investigation, including:

    • Forensic and Network Investigators
    • IT Security Officers
    • Law Enforcement Officials.

« BACK

« Back