Of the programs offered by IACIS, the Basic Computer Forensic Examiner (BCFE) Training Program is at the forefront.
|
|
|
- Toby Holmes
- 10 years ago
- Views:
Transcription
1 BCFE 2015 BASIC Certified Examiner Training Program Program Description and Syllabus Contents A. Program Overview B. Prerequisites C. Automated Tools, Hardware, and Software D. Required Equipment and Supplies E. Attendance and Program Conduct Requirements F. Course Schedule for Week 1 and Week 2 A. Program Overview IACIS is an independent, non-profit, peer-review organization that has been recognized as a leader in computer forensics training since Each year IACIS offers several courses of study, at various locations worldwide, including a variety of advanced and specialized courses and programs that are specifically targeted to a particular topical focus or a particular sub-specialty within the field of computer forensics. Of the programs offered by IACIS, the Basic Computer Examiner (BCFE) Training Program is at the forefront. The IACIS BCFE Training Program is a 80-hour course of instruction this is offered over a period of two (2) consecutive weeks, and which is designed to provide students with the foundation knowledge necessary to enter the IACIS Certified Computer Examiner (CFCE) process. Through a combination of lectures, instructor-led and independent hands-on practical exercises, and independent laboratory activities students will learn the underlying principles of computer forensic examination and how to apply them in practice. While this program might seem to be primarily for those students who are new to or just starting out in the field of computer forensics, it is in fact equally suitable for more advanced students and those who are long-time practitioners: IACIS espouses, and the BCFE program champions, a forensic tool-independent and forensic methodologyindependent approach to learning computer forensics. This enables IACIS to provide students with a deeper exploration of underlying principles than might be afforded in other programs, which are designed to teach students how to use a particular forensic tool to complete a particular task. Approximately 90% of what is needed for students to successfully complete the BCFE program and the subsequent certification process is provided during course program IACIS The International Association of Computer Investigative Specialists Page 1 of 7
2 lectures and practical exercises, and so students are expected to do additional outside reading and to perform additional independent research. The program schedule includes substantial laboratory time (optional) for students who need or want additional assistance on particular topics. B. Prerequisites While there are no prerequisites for entry into the BCFE program beyond the applicable IACIS membership requirements, students are expected to be comfortable using a computer and working with electronic devices; and students should have an appropriate interest in the field of computer forensics generally. And while students are also expected to be familiar with the family of operating systems, no advanced level knowledge of the various versions or editions is expected or required. That said, the student whose experience with is limited to XP versions and earlier may find the BCFE program very challenging. Finally, while knowledge of and experience working within different operating system environments such as DOS, various versions of Apple/Mac/iOS, and various flavors of the Linux operating system can be helpful for students, such knowledge and experience are by no means required for successful completion of the BCFE program or the CFCE process. It is important to note that the BCFE program does not distinguish between someone who has very basic computing skills and who is just starting out in the field of computer forensics, and one who has more advanced knowledge of computers or prior training in general information technology topics or in computer forensics. Certainly one who has more extensive experience will initially be more comfortable with some of the foundational course material, but as the program advances whatever knowledge gap there might be at the start of the program will quickly close. In the end, all students are considered at the same level, as it were; and individual courses are constructed with this in mind. C. Automated Tools, Hardware, and Software IACIS espouses a forensic tool-independent and forensic methodology-independent approach to teaching computer forensics. To this end, IACIS does not endorse or support any particular forensic software tool, forensic hardware device, or any particular software program generally. Students are not required or expected to have any knowledge of any particular forensic software or automated tool suite; and in fact there is no expectation that students in the BCFE program be familiar with or have any experience using any particular software program. Similarly, students are not required or expected to have any knowledge of any particular IACIS The International Association of Computer Investigative Specialists Page 2 of 7
3 forensic hardware device or component. The above notwithstanding, automated and manual forensic software tools will be used during instructional modules to illustrate teaching points and to facilitate MANUAL study of data structures and data recovery by using a limited functionality of particular tool or suite of tools. Similarly, particular forensic hardware devices might also be used to teach students about particular forensic processes. In cases where use of any particular hardware item or software program of any type is required for an instructor-led activity, in-class practical exercise, or independent laboratory exercise, students will be provided access to the particular hardware item or software program, and there will be instruction as to the use of that particular hardware item or software program for the limited purpose of the activity at hand. So there are no misunderstandings, regardless of what hardware item or software program might be used, the purpose of any instruction that might be provided with respect the item or program is intended solely for the immediate purpose of the instructional block at hand, and is not designed to provide specific training on that hardware item or software program. D. Required Equipment and Supplies Students will be supplied with all of the materials needed to successfully complete the BCFE program. This includes a program manual that includes instructor-led practical and independent laboratory exercises, various hardware and software tools/items, and other items and resources that are needed for particular courses or that might be of benefit later, in the field. Students are not required to bring a computer with them to the training program. With participation in the BCFE training event, IACIS is providing each student a laptop computer for their use during the event and also to take home with them and use. Along with the laptop, student will also receive a write-blocker amongst other equipment. The BCFE Training is contained in three (3) printed manuals. Students should be aware that they will be returning home with more baggage than they came with and should make arrangements for this. In the past, IACIS has tried to get a package mailing company to stop by the hotel towards the end of the event so that students can ship extra equipment back to their homes or Agencies. This is at the students own cost. IACIS will try to find a similar vendor for 2015, but if that is not possible, there is a UPS store within walking distance from the hotel. Students may bring a laptop computer or other digital device with them for personal use outside of the classroom. Students are not permitted to use their personal laptop computers, pad/tablet computing devices, cellular telephones, and other personal computing devices in the classroom. IACIS The International Association of Computer Investigative Specialists Page 3 of 7
4 E. Attendance and Program Conduct Requirements The BCFE program provides approximately eighty (80) hours of instruction in various computer forensics courses. The program runs for two (2) consecutive weeks, Monday through Friday, from 8:00 AM to 5:00 PM daily each week, with a one (1) hour break for lunch from 12:00 noon to 1:00 PM each day. On the 2 nd Friday of the program, the event will conclude by 5:00 PM after closing ceremonies, as noted below. Courses are timed using the traditional 50 minute hour to allow for a short break near the top of each hour, whenever possible. On the first day of the program, the first hour (from 8:00 AM to 9:00 AM) is used for administrative purposes such as staff introductions and providing students information about the programming to follow. That hour is considered part of the overall program due to the vital information provided. The afternoon on the last day of the program (3:00 PM to 5:00 PM) is dedicated to various administrative and IACIS membership services topics. This includes a critical presentation on the Certified Computer Examiner (CFCE) process. At the conclusion of the presentations students who met all requirements for successful completion of the program will be issued certificates of completion for the BCFE program. So there is no misunderstanding, the certificate of completion awarded to students who successfully complete the 80-hour BCFE course of instruction and is not the IACIS Certified Computer Examiner certificate. The CFCE process is a process unto itself. The CFCE process will be addressed during the BCFE program. Students are expected to attend all training sessions. Classes begin promptly at 8:00 AM, and students are expected to be prepared to begin the instructional day at that time. Classes will always continue until 5:00 PM on each class day. On the final day, the program will close by 5:00 PM. It is important for students to understand that the presentations in the afternoon of the last day, are considered mandatory: The bulk of the afternoon consists of a lengthy session addressing the CFCE process, and it is during this time that all of the information regarding that process is presented to students. Moreover, vital information is provided on what IACIS services and resources are available to members; and instructions are provided on how these services and resources are accessed. Due to the important information being discussed towards the end of the training event, information that will help you during the CFCE process, please do not book return flights out of Orlando before 7:00 or 7:30 p.m. on Friday to allow for security clearances and traffic to the airport. IACIS understands that unforeseen circumstances and emergency situations may arise, and so students are permitted to briefly leave the classroom to deal with such situations. That said, students who have prolonged absences from class may not be issued a certificate of completion at the end of the program, and may not qualify for entry into the CFCE process. While students are encouraged to take notes during classes, activities, and laboratory sessions, students are not permitted to use their personal laptop computers or other personal computing devices during any classes. Similarly, students are not permitted to use any audio or video recording devices, at any time during any classroom or laboratory IACIS The International Association of Computer Investigative Specialists Page 4 of 7
5 session. Students are expected to dress professionally and appropriately for a business casual environment (collared shirt, slacks, etc.). Shorts, tank tops, sandals, flip-flops, and similar casual apparel will not be permitted in the classroom at any time. Something for students to consider is that the classroom is air conditioned, and the temperature is set lower than what one may typically expect to keep the room comfortable given the heat that can be generated by a large group people and over 200 computers. At times, however, when the computers are idle, the room can become too cold for some students, so one might consider bringing a sweater or light jacket to wear. Students must be mindful of the fact that the classroom is large, with approximately 200 students and staff. Even small distractions can make it difficult for others to hear or to remain focused on the instructor. So, then, students are asked to be courteous and aware of their fellow students. During classes, students are expected to be attentive and fully engaged. Cell phones must be put on vibrate or silent mode, and students should step out of the classroom if it becomes necessary. The training event takes place at the Marriott Lake Mary, 1501 International Parkway, Lake Mary Fl 32746, Phone The hotel is located about 40 miles from the Orlando International Airport (MCO). A taxi ride from MCO to the hotel can cost $80.00 (US) and up, based on traffic congestion at the time. Towards the start of the training event, you may be able to post to the IACIS Listserv to find cab-share for students. There are many eating establishments within walking distance from the hotel including a supermarket, banks, and a cleaner. The hotel does have a coin-operated laundry facility. IACIS The International Association of Computer Investigative Specialists Page 5 of 7
6 F. BCFE Course Schedule Week 1 Week 1 Monday Tuesday Wednesday Thursday Friday 8:00 Opening Ceremonies and Administrative Tasks 8:30 Admin Task/Competencies Disk Structures NTFS File Hardware Identification 08:50-9:00 9:00 Numbering s Disk Structures First Responder I - Planning 9:50-10:00 10:00 Numbering s 10:50-11:00 11:00 Introduction to WinHex 11:50-13:50-14:50-15:50-16:00 FAT File First Responder II - Crime Scene First Responder II - Crime Scene LUNCH LUNCH LUNCH LUNCH LUNCH BIOS, Boot Sequence, and Boot Environments Intro to Analysis & Practical Scenario BIOS, Boot Sequence, and Boot Environments Legal/Ethics Acquisition Practical Exercise BIOS, Boot Sequence, and Boot Environments 16:00 Disk Structures 16:50-17:00 NTFS File Legal/Ethics Acquisition Practical Exercise END OF DAY END OF DAY NTFS File Hashing & Hash Sets Acquisition Practical Exercise END OF DAY END OF DAY END OF DAY LAB NO LAB LAB LAB LAB NO LAB IACIS The International Association of Computer Investigative Specialists Page 6 of 7
7 F. BCFE Course Schedule Week 2 Week 2 Monday Tuesday Wednesday Thursday Friday 8:00 Active File Review Registry File Metadata P2P Cloud Storage 08:50-9:00 9:00 9:50-10:00 10:00 10:50-11:00 11:00 11:50-13:50-14:50-15:50-16:00 16:00 16:50-17:00 Registry Compound Files P2P Search Strategies Registry Mac Triage Methodologies Encryption Mac Triage Report Writing LUNCH LUNCH LUNCH LUNCH LUNCH Encryption Mac Triage Courtroom Testimony File Headers and Carving Small Scale Devices Courtroom Testimony File Headers and Carving (Social Media) Small Scale Devices Administrative / eservices END OF DAY File Headers and Carving ( ) Small Scale Devices Certification Process END OF DAY END OF DAY END OF DAY END OF DAY LAB LAB LAB LAB NO LAB NO LAB IACIS The International Association of Computer Investigative Specialists Page 7 of 7
Cyber Incident Forensic Response (CIFR) 2015
Cyber Incident Forensic Response (CIFR) 2015 Cyber Incident Forensic Response Training Program Program Description and Syllabus Contents A. Program Overview B. Prerequisites C. Automated Forensic Tools,
CTC 328: Computer Forensics
FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: [email protected] Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
FINAL SCHEDULE YEAR 1 AUGUST 18 22 WEEK 1
YEAR 1 AUGUST 18 22 WEEK 1 TIME MONDAY (18) TUESDAY (19) WEDNESDAY (20) THURSDAY (21) FRIDAY (22) 11am 1 LUNCH LUNCH LUNCH LUNCH LUNCH 3 YEAR 1 AUGUST 25 29 WEEK 2 TIME MONDAY (25) TUESDAY (26) WEDNESDAY
RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University
December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information
General Course Information Department IST Number 454 Title Credits 3 Description Computer and Computer and communication technologies have become the key components to support critical infrastructure services
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
COS/PSA 412 Computer Forensics and Investigations
COS/PSA 412 Computer Forensics and Investigations Date: November 18, 2003 Division: Natural and Behavioral Sciences Number of Credits: 4 Location: Nadeau 109 Meeting Times: TBD Course Description Computer
Introduction to Computer Forensics ITP 499 (3 Units)
Introduction to Computer Forensics ITP 499 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are
HOWARD. UNIVERSITY School of Business
HOWARD UNIVERSITY School of Business FALL 2009 COURSE SYLLABUS NETWORK/INTERNET SECURITY MANAGEMENT Faculty: Dr. Kamal Nayan Agarwal, Associate Professor Semester: Fall 20 Department : Information Systems
CCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
Advanced Digital Forensics ITP 475 (4 Units)
Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming
Computer Forensics (3 credit hours)
Syllabus for Fall 2010 Computer Forensics (3 credit hours) COURSE INFORMATION Instructor: Smith Office: A 112-B Phone: 291-4920 Email: [email protected] Class Time: TH from 7:00 8:15 p.m. Room: A 112
IS 6363 Computer Forensics Spring 2006
Class Information: IS 6363 Computer Forensics Spring 2006 Class Time: 5:30-6:45 p.m. Tue/Thu Class Location: BB 3.03.10 Lab Location & Hours: BB 3.03.10 (Hours as posted. Should mirror APL hours.) Instructor
RouseABOUT Graphics Seminar 2008 Summer Session
RouseABOUT Graphics Seminar 2008 Summer Session A RouseABOUT Graphics Seminar is an advanced course in Rouse Balloon Graphics. Just as in a language immersion weekend, we will eat, sleep and breathe RMS
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
Engineering Problem Solving and Programming (CS 1133)
Academic Preview 2009: CS 1133 p. 1/ ACADEMIC PREVIEW: Engineering Problem Solving and Programming (CS 1133) K. Ming Leung [email protected] http://cis.poly.edu/ mleung Department of Computer Science
Introduction to Computer Forensics Course Syllabus Spring 2012
Course Information Course Syllabus Spring 2012 Instructor: Dr. Mike Jochen Phone: 570.422.3036 Email: [email protected] Office: 337 SCITECH Building Office Hours: Tues/Thurs 11 a.m. noon Weds 9 a.m. noon
Syllabus -- CIS 120 -- Computer Maintenance / A+ Certification
Syllabus -- CIS 120 -- Computer Maintenance / A+ Certification Cuyamaca College: Fall 2015 Tim Phillips Adapt and overcome USMC proverb 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Module C5 Longitudinal Data Analysis
Stream C Advanced Module C5 Analysis 2-6 November 2015, The University of Queensland, Brisbane This five-day intensive course has been specifically designed to deepen the specialist knowledge of your research
(Part 2) Lunch Block 7 1:05 PM 2:27 PM
Wednesday, December 2 (5,1,3,7) Cycle day 3 Module 1 of the Algebra I Exam 4 BLOCK DAY LUNCHES ASSIGNED BY LOCATION DURING 3 RD. 2 nd floor classes (unless assigned b lunch below): A lunch Basement, Health,
OUR LADY OF THE LAKE UNIVERSITY SCHOOL OF BUSINESS AND LEADERSHIP CISS 3342 SYLLABUS
OUR LADY OF THE LAKE UNIVERSITY SCHOOL OF BUSINESS AND LEADERSHIP CISS 3342 SYLLABUS COURSE NUMBER: CISS 3342 TITLE: Computer Forensics and Investigations CATALOG DESCRIPTION: Overview of methods and tools
NEBB Cleanroom Performance Testing Certified Professional Seminar and Exams
NEBB Cleanroom Performance Testing Certified Professional Seminar and Exams October 20-22, 2014 Orlando, FL Introduction Cleanroom testing must be performed to ensure that cleanrooms comply with design
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in
ACCT 510 Forensic Accounting Spring 2015 T/R 10:50 12:05 PM, Tate 304
ACCT 510 Forensic Accounting Spring 2015 T/R 10:50 12:05 PM, Tate 304 Instructor: Jason Rasso, Ph.D., CFE Office: Beatty 215 E-Mail: [email protected] Office Phone: 953-3030 Office Hours: T/R 8:30 9:15
Physics 21-Bio: University Physics I with Biological Applications Syllabus for Spring 2012
Physics 21-Bio: University Physics I with Biological Applications Syllabus for Spring 2012 Class Information Instructor: Prof. Mark Reeves (Samson 214, [email protected] 46279) Office Hours: Tuesday 4:30-5:15
Nurse Assistant Training Program Application MISSION STATEMENT ADMISSION REQUIREMENTS BACKGROUND CHECKS/BARRIER CRIMES
Nurse Assistant Training Program Application The American Red Cross Nurse Assistant Training Program meets the Virginia Board of Nursing s 120-hour requirement for Nurse Assistant Training in Virginia.
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Developing Computer Forensics Solutions for Terabyte Investigations
Developing Computer Forensics Solutions for Terabyte Investigations Eric Thompson Corporation Orem, Utah USA www.accessdata.com Overview Computer Forensic Definition, Objectives and Policies History of
CSC 314: Operating Systems Spring 2005
CSC 314: Operating Systems Spring 2005 Instructor: Lori Carter [email protected] (619) 849-2352 Office hours: MWF TTh 11:00 a.m. 12:00 p.m. 1:15 2:15 p.m 10:00-11:30 a.m. Texts: Silbershatz et.al, Operating
CMJ 256 - CRIME SCENE INVESTIGATION Spring Syllabus 2015
INSTRUCTOR INFORMATION Associate Professor David Striegel Guerrieri Hall, Room 202D Office Phone: 410-572-8755 Office Hours: CMJ 256 - CRIME SCENE INVESTIGATION Spring Syllabus 2015 Monday 10:45 11:45
Thursday 11:00 a.m. - 12:00 p.m. and by appointment
Instructor Information Instructor: CIS 4: Introduction to Computers, Business Applications Gina Jerry Phone: 310-434-4686 E-mail: Website: Course Website: Office: Office Hours: Course Description [email protected]
A High School Diploma: The Foundation for Life. USD 489 Hays EOE. Individualized, Mastery-Based Instruction Work at your own pace Online or in our Lab
Individualized, Mastery-Based Instruction Work at your own pace Online or in our Lab A High School Diploma: The Foundation for Life 323 West 12th Street Hays, KS 67601 hayslc.com Phone: 785-623-2426 [email protected]
Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Polaris Career Center Course Syllabus Medical Assisting Adult Course Information Instructor(s): Theresa Liska Cathy Good Phone: 440-891-7710 Fax: 440-891-7642 Email: [email protected] [email protected]
2016 Training Catalog. 2016 Thermal Management Training Catalog Liebert Cooling Products
Network Power Learning Center Westerville Campus 530 Westar Blvd., Westerville, OH 43082 Phone: (614) 841-6120 / Fax: (614) 841-6133 (Revised 10-20-15) 2016 Training Catalog 1 General Information Instructors:
MPAY Software 12th Annual User Conference
MPAY Software 12th Annual User Conference Client Information Package August 21-23, 2008 Hyatt Regency Boston 2008 BOSTON, MA Table of Contents Hotel Information 3 General Information Attire 4 Weather 4
Module C5 Longitudinal Data Analysis
Module C5 Analysis 24 28 November 2014, The University of Queensland, Brisbane This five-day intensive course has been specifically designed to deepen the specialist knowledge of your research teams and
SERVICE CERTIFICATION TRAINING PROGRAM
SERVICE CERTIFICATION TRAINING PROGRAM About the Service Certification course Precor s Service Certification Training Program is a comprehensive 5 day training program that provides service technicians
Security and Computer Forensics ITP 477 (4 Units)
Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,
South Plains College. MATH 2320 Differential Equations Section 001, M W 8 9:15 am Math Bldg., Rm. 105
South Plains College MATH 2320 Differential Equations Section 001, M W 8 9:15 am Math Bldg., Rm. 105 Instructor: Miss S. Davis Office Hours: Office: 103 MATH Bldg. Phone: (806) 894 9611 ext. 2699 E-mail
Introduction to Forensic Anthropology ASM 275, Section 6146, Glendale Community College, Spring 2008
Introduction to Forensic Anthropology ASM 275, Section 6146, Glendale Community College, Spring 2008 Instructor: Dr. P. James Macaluso Email: [email protected] Phone: 480-731-8866, Mailbox
SERVICE CERTIFICATION TRAINING PROGRAM
SERVICE CERTIFICATION TRAINING PROGRAM COURSE INFORMATION About the Service Certification course Precor s Service Certification Training Program is a comprehensive 5 day training program that provides
Training Course CompTIA A+
Brochure More information from http://www.researchandmarkets.com/reports/2226574/ Training Course CompTIA A+ Description: CompTIA A+ Essentials & Practical Application teaches students the competence in
ABNORMAL PSYCHOLOGY (PSYCH 238) Psychology Building, Rm.31 Spring, 2010: Section K. Tues, Thurs 1:45-2:45pm and by appointment (schedule via email)
ABNORMAL PSYCHOLOGY (PSYCH 238) Psychology Building, Rm.31 Spring, 2010: Section K Instructor: Mikhail Lyubansky, Ph.D. Email: [email protected] Office: 723 Psychology Building Phone: 333-7740 Mailbox:
INTRO TO COMPUTER GRAPHICS
INTRO TO COMPUTER GRAPHICS Instructor: Jayna Conkey Phone: 283-1822 Email: [email protected] Office: 326E at the High Tech Center Office Hours: M: 4:45-5:30, T: 2:30-4:00, W: 4:45-5:30 and 6:45-7:15, Tr: 2:30-4:00
FBI NATIONAL ACADEMY ASSOCIATES
FBI NATIONAL ACADEMY ASSOCIATES 2011 Youth Leadership Program Candidate Information The FBI National Academy Associates, Inc. (FBINAA), an organization comprised of law enforcement professionals who are
MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.
MS-50292: Administering and Maintaining Windows 7 This five-day instructor-led course provides students with the knowledge and skills to successfully install, maintain, and troubleshoot Windows 7 computers.
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Math 103, College Algebra Fall 2015 Syllabus TTh PM Classes
SECTION #: Lecture Time: Lecture Location: Lecture Instructor: Office Hours: Office Location: Phone: E-mail: Class Materials: Graphing Calculator: A graphing calculator is required for this course and
How To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
The Basics of Digital Forensics; John Sammons; Syngress, 2011; ISBN-13: 978-1-59749-662-9
COURSE OUTLINE COURSE NUMBER: DIT 33003 1201 COURSE NAME: INSTRUCTOR: INSTRUCTOR CONTACT: COMPUTER FORENSICS GIDZAK Provided in class. DATES & TIMES: March 18-28, 2013, Mon-Thu (8 classes) 9:00am 12:00pm
MAT 1111: College Algebra: CRN 30500 SPRING 2013: MWF 11-11:50: GRAY 208
MAT : College Algebra: CRN 30500 SPRING 2013: MWF -:50: GRAY 20 Course Syllabus: Please read this document completely. Instructor Information: Name: Connie High Office Phone: 9-391- 52 Office: Britt Hall,
California State University, Chico Department of Health & Community Services
California State University, Chico Department of Health & Community Services HCSV 471-02: Health Education Planning:Theory & Practice, Spring 2012 Instructor: Dr. Holly Nevarez Office location: Butte 647
Computer and Network Forensics INF 528 (3 Units)
Computer and Network Forensics INF 528 (3 Units) Fall 2014 Description According to the Internet Crimes Complaint Center Annual Report, in 2011, there were over 300,000 incidents reported to the organization,
FDA/Centers: your center training contact, who will submit it to the DHRD training officer.
DATE: September 9, 2011 FROM: John Shafer Director, Division of Human Resource Development (HFC-60) SUBJECT: COURSE ANNOUNCEMENT Biomanufacturing Principles and Processes Training (DG426, DG427, DG428,
GGR272: GEOGRAPHIC INFORMATION AND MAPPING I. Course Outline
DESCRIPTION GGR272: GEOGRAPHIC INFORMATION AND MAPPING I Course Outline This course is an introduction to digital mapping and spatial analysis using a geographic information system (GIS). Students learn
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Digital Forensics at the National Institute of Standards and Technology
NISTIR 7490 Digital Forensics at the National Institute of Standards and Technology James R. Lyle Douglas R. White Richard P. Ayers NISTIR 7490 Digital Forensics at the National Institute of Standards
AAT Level 2 Award Computerised Accounting and Sage Instant Accounts course
HOME STUDY COURSES AAT Level 2 Award Computerised Accounting and Sage Instant Accounts course Web: CONTENTS INTRODUCTION... 1 ABOUT THE SYLLABUS... 2 ASSESSMENT AND EXAMINATIONS... 2 ABOUT THE TUTOR SUPPORT...
SOUTHWESTERN MICHIGAN COLLEGE SCHOOL: Arts and Sciences Niles, Michigan COURSE SYLLABUS Fall Semester 2014
SOUTHWESTERN MICHIGAN COLLEGE SCHOOL: Arts and Sciences Niles, Michigan COURSE SYLLABUS Fall Semester 2014 COURSE TITLE: Spanish for the Workplace COURSE # Spanish 170 SECTION# 2859 CREDITS/CONTACTS: FINAL
ADVANCED COMPOSITION: AMERICAN ACADEMIC CULTURE
ADVANCED COMPOSITION: AMERICAN ACADEMIC CULTURE Dominic Ashby, Instructor Advanced Composition will help you to develop an insider s view of academic culture in the United States, with a special focus
Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later)
Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later) General Information The Accelerated Alternate Delivery (AAD) Pathway in Surgical
LECTURE - 3 RESOURCE AND WORKFORCE SCHEDULING IN SERVICES
LECTURE - 3 RESOURCE AND WORKFORCE SCHEDULING IN SERVICES Learning objective To explain various work shift scheduling methods for service sector. 8.9 Workforce Management Workforce management deals in
How To Learn To Use A Trane Building Control System
Customer Training Catalog: Trane College of Building Automation Instructor-Led and Online Learning Revised 04.13.2015 2 Trane College of Building Automation General Information The training described in
ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014
ACC 7145, Summer Session 2014 Page 1 Wayne State University School of Business Administration ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014 Instructor Name: Office: Telephone:
Fundamental Theory & Practice of Digital Forensics. Training Course
Fundamental Theory & Practice of Digital Forensics Training Course Following a decade of investment to meet the needs of intelligence and military agencies, the new generation ILookIX is now available
Sandra Day O Connor High School 25250 N. 35 th Avenue Phoenix, Arizona 85083 (623) 445-7100 (623) 445-7180 (fax) sdohs.dvusd.org
Sandra Day O Connor High School 25250 N. 35 th Avenue Phoenix, Arizona 85083 (623) 445-7100 (623) 445-7180 (fax) sdohs.dvusd.org Course: FORENSIC SCIENCE E-mail: [email protected] Teacher: Jonathan
Syllabus: Office Technology Medical Office Assistant
Syllabus: Office Technology Medical Office Assistant Subject Code: 140320 Course Number: OT9501 CIP Code: 11.1001 SOC Code: 11-3021 C-TEC of Licking County 150 Price Road Newark, Ohio 43055 Instructor:
2015 Federal Workers Compensation Conference Exhibitor & Sponsor Information July 27 29, 2015 Marriott Tampa Waterside Hotel: Tampa, FL
Workers' Compensation Conference Mission Statement: The purpose of this conference is to impart the skills, knowledge and expertise of world class subject matter experts to conference participants. Moreover,
AUGUST 2015. Register for our workshops on Academica. Workshops. Consultation Services. otl.wayne.edu
AUGUST Workshops Introduction to Blackboard Would you like to make the most of your Blackboard site? This workshop focuses on the design, development, and organization of hybrid, traditional, and online
NATO CIVILIAN PRE-DEPLOYMENT COURSES IN 2010 JOINING INSTRUCTIONS
Training Command - Military Academy Velitelství výcviku - Vojenská akademie Víta Nejedlého 3 682 01 Vyškov Czech Republic Tel Number: +420 724 692 650 +420 724 692 987 Fax Number: +420 973 451 300 Email:
Cosc 1301 - Microcomputer Applications Course Syllabus: Fall 2014
Cosc 1301 - Microcomputer Applications Course Syllabus: Fall 2014 Northeast Texas Community College exists to provide responsible, exemplary learning opportunities. Will McWhorter, Ph.D. Office: Math /
