Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask

Size: px
Start display at page:

Download "Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask"

Transcription

1 Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask

2 Table of Contents How to Evaluate Mobile Forensics Training Does the vendor ground you in forensic best practices as well as its tool? Does the vendor offer training and certification for every investigative level? Is it the right course for the investigations you perform? Do the delivery models provide you with the flexibility you need? Are the trainers experienced and proficient professionals?...8 Maximize value by choosing the right training vendor...9 Page 2

3 How to Evaluate Mobile Forensics Training Whether you're new to mobile device forensics, or looking to take your skills to the next level, the amount of available mobile forensics training available can be overwhelming. You might be tempted to sign up for the cheapest course, or the course closest to you. However, cheap or close mean little if the training doesn t prepare you to effectively obtain, use, and testify about mobile device evidence. Good training and certification programs can remove many of these unknowns. From showing you how to get the most out of your mobile forensics hardware and software, to preparing you to testify in court, training should prepare you for a full range of responsibilities as a first responder, mobile data analyst, and/or forensic specialist. Here are some criteria to use in your evaluations. 1 Does the vendor ground you in forensic best practices as well as its tool? 2 Does the vendor offer training and certification for every investigative level? 3 Is it the right course for the investigations you perform? 4 Do the delivery models provide you with the flexibility you need? 5 Are the trainers experienced and proficient professionals? Page 3

4 1 Does the vendor ground you in forensic best practices as well as its tool? When researching training, you may encounter professionals who believe that the only good training is vendor-neutral training. Their argument: vendor-neutral training focuses on the forensic process across a spectrum of tools, rather than relying on one tool to complete examinations. Vendor-neutral training can improve your overall expertise, and may even provide a package of tools to take back to your office. It can help supplement your process in that it presents a range of options you can use to validate your evidentiary findings. In higher education, it can also serve as a foundation for research and development work. However, it s important to note that courts value examiners who are certified and adept at using specific tools. Because vendor-neutral training likely cannot go as in depth on each tool as a certification course, it cannot show what's possible to achieve in your investigations through extensive use of a single tool's built-in features. Therefore, look for a third option: the vendor that builds its curriculum on a foundation of forensic process. This curriculum builds in third-party tools as part of a broader approach to best practices, including the validation of the vendor s own tool results. This approach ensures that not only will the training prepare you to testify in detail about your use of the vendor s tool; it will also prepare you to discuss your use of the tool as part of an objective forensic methodology. Page 4

5 2 Does the vendor offer training and certification for every investigative level? Ideally, trainers offer basic, intermediate, and advanced courses for every level of investigative expertise. These should build on one another so that your skills improve with each level. They can be offered by level, or bundled into an entire week's worth of training. If you're brand-new to mobile forensics, look for a course that includes fundamentals, such as the difference between a logical and physical exam, what you can get from a SIM card vs. in-built memory, etc. This type of course should give you the basics of mobile device technology, and forensic process from seizure through extraction to validation. A course that teaches logical extraction should go into more detail on extraction and analysis processes than a basic course does. It should explore logical data analysis methods, focusing on analytics that can help you make immediate use of data. Investigators who want and need to take the next step from basic to advanced forensic examination skills should look for courses that build on the foundation of their existing knowledge. This kind of instruction should include processes like data carving, a wider variety of search and filtering techniques, and device-specific challenges. The more complicated the forensic process, the longer the class should be. That shouldn t put you off, however. Longer classes give you more opportunity to understand the subjects and to interact with experienced instructors as you seek to build your understanding. This will also put you in a better position to apply what you ve learned immediately upon returning to work, no matter what your skill level Are certifications important? is or what your certification is Certification in the use of a tool can be critical to your potential for. status as an expert witness, and even to your testimony as a fact witness. It should help you successfully meet an admissibility challenge in court, as well as withstand cross-examination about your process and the tools you used. Certification can also help employers' decision-making about whether to hire or promote you. The examiner who carries a meaningful, industry-recognized certification means that s/he has demonstrated a level of proficiency and dedication to his or her work, and is prepared not only to meet the demands of forensic analysis, but also to testify about it if called. The ideal certification has both written and practical components, and is offered on a refresher basis to help you keep your skills up to date. No more than two years should pass before you refresh your certification training, to account for the dynamic nature of the cellular market. Page 5

6 3 Is it the right course for the investigations you perform? Be sure the curriculum at each level meets your requirements for the work you or your employees will be performing. First responders and investigators need the skills to obtain evidence that is both actionable, and legally defensible. This is because in many cases, logical data undeleted low hanging fruit and/or evidence of a nonfelony offense may be enough to build a case. When it provides insights into a subject s patterns of life, including frequent contacts and communications, it may also have immediate intelligence value. Because in these cases, speed is as important as accuracy, the course geared for these needs should cover search and seizure procedures, as well as evidence handling, analysis, and documentation processes that can be applied on the scene and/or back at the office. This type of course should also help investigators collaborate more closely with lab examiners when they need to escalate evidence gathering and analysis. Investigators whose primary job is to focus on mobile device and other forensic examinations need coursework in learning how to do deeper extractions. This is relevant in cases where logical extraction data is circumstantial or unavailable, and it becomes necessary to obtain via file system or physical extraction. Certification in the use of a tool can be important to your potential status as an expert witness. It should help you successfully meet an admissibility challenge in court, as well as withstand cross-examination about your process and the tools you used. It may also help employers' decision-making about whether to hire or promote you. Because these methods can include a wide variety of complex tools and techniques, including data carving, multiple search tools, malware scanning, or other traditionally forensic methods, coursework should cover both automated and manual decoding, analysis, and validation techniques, with an emphasis on preparing examiners to testify about their work in court. Finally, supervisors, prosecutors, and others who are not directly involved in evidence collection, but supervise those who are, should attend a primer course that covers mobile forensics fundamentals. Topics in this course cover basic extraction and analysis capabilities, what search and seizure entails on a mobile device, and evidence handling. Page 6

7 4 Do the delivery models provide you with the flexibility you need? Look for a curriculum that can be presented in a variety of delivery models, that gives you the flexibility you need to address your specific professional development requirements. Although some courses may be offered to personnel in a single organization, many are set up to allow investigators to network with one another. In-person training is ideal when you are located nearby convenient training facilities, and your schedule allows. It may also be offered at conferences you plan to attend. If your organization has the space, you may be able to save some The money by hosting courses. ideal certification has both written and practical components, and is offered on a Online instructor-led training combines classroom interaction refresher basis to help you keep your with the convenience of internet-based study, when your schedule doesn t fit a planned class training in your area or you are skills up to date. No more than two years should pass before you refresh your located too remotely from classroom training facilities. certification training, to account for Self-paced online training is best for professionals with tight schedules. the dynamic nature of the cellular market. Either way, online training should allow for hands-on expertise via interactive tutorials, and should facilitate timely contact with instructors should you have questions or need help. In addition, training manuals should be available for you to refer back to after your coursework is complete. Is the class length optimal for learning? The more complicated the forensic process, the longer the class should be. That shouldn t put you off, however. Longer classes give you more opportunity to understand the subjects and to interact with instructors as you seek to build your understanding. This will also put you in a better position to apply what you ve learned immediately upon returning to work, no matter what your skill level is or what your certification is for. Basic, intermediate, and advanced level courses should build on one another so that your skills improve with each level. They can be offered by level, or bundled into an entire week's worth of training. Core fundamentals typically can be covered in just eight hours (one day), but certification classes on logical and physical extraction and analysis should each take longer: two to three days (16 to 24 hours), respectively. Page 7

8 5 Are the trainers experienced and proficient professionals? Whether beginner, intermediate, or advanced, mobile forensics students should seek out trainers who: Understand the forensic process and can answer questions about the material they present Have deep experience with digital forensic examinations, lab, field, and court procedures Train students toward professional goals, not the training organization s goals Are committed to student learning, to the extent that they remain accessible throughout the duration of the course and beyond Have an understanding of adult education and how to read their audience Create curriculum that presents logical, step-by-step instruction that is easy to follow How do you find out whether courses and instructors meet these criteria? Ask. Listservs for HTCIA, IACIS, HTCC, and other groups; forums such as Forensic Focus, phone-forensics.com, and others; and even Twitter all serve as communities you can ask for recommendations. You can also call upon investigators who work at forensic labs in your own region, along with those you may meet at conferences and other events. Be sure to research the trainers teaching the courses, and ask what other students thought of them as well as their material. Page 8

9 Maximize value by choosing the right training vendor When time and funding are scarce, you need training that will help you maximize your return on investment. This return includes the confidence you need to collect and analyze accurate digital evidence, and the authority you need to testify about your process. Whether you are seeking to get started with mobile forensics, or you re trying to take the next step to become an expert in mobile forensics, look for training vendors who can give you the solid foundation you need in forensic process, the certification you need for your level of responsibility, and the flexibility to complete the curriculum in the time and place that works best for you. Cellebrite's New Standardized Forensic Training and Certification Open to all user levels, from beginners to advanced, Cellebrite certification training provides hands-on experience with Cellebrite products and applications, delivering the tools and knowledge required for evidence collection from mobile phones and portable GPS devices, data analysis, searching, and reporting. Upon completion of a course, each participant receives a certificate, making them eligible to move to the next stage in the curriculum. Upon successful completion of the core curriculum, students have the opportunity to enter an extensive capstone certification process known as Cellebrite Certified Mobile Examiner (CCME). This capstone examination, which includes both knowledge and practical content, tests the student's knowledge in all of the domains offered in Cellebrite's forensic core curriculum. Students must demonstrate proficiency with Cellebrite's tools and methodology at a level that signifies competency as a Cellebrite Certified Mobile Examiner. Cellebrite: Delivering Mobile Expertise Founded in 1999, Cellebrite is a global company known for its technological breakthroughs in the cellular industry with dedicated operations in the United States, Germany, Singapore, and Brazil. A world leader and authority in mobile data technology, Cellebrite established its mobile forensics division in 2007, introducing a new line of products targeted to the law enforcement sector. Using advanced extraction methods and analysis techniques, Cellebrite s Universal Forensic Extraction Device (UFED) is able to extract and analyze data from thousands of mobile devices, including feature phones, smartphones and GPS devices. Cellebrite s UFED is the tool of choice for thousands of forensic specialists in law enforcement, military, intelligence, security, government and private sector organizations in more than 100 countries. Cellebrite is a wholly-owned subsidiary of the Sun Corporation, a listed Japanese company (6736/JQ). Page 9

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS

SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS Extract the Insights that Focus Investigations CELLEBRITE UFED PRO SERIES THE DATA SOURCES THAT MATTER MOST 95% MOBILE DEVICE ITSELF 59% THIRD-PARTY

More information

How To Solve A Violent Home Invasion With A United Force

How To Solve A Violent Home Invasion With A United Force Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone

More information

Build Stronger Cases with Mobile Device Link Analysis

Build Stronger Cases with Mobile Device Link Analysis White Paper Build Stronger Cases with Mobile Device Link Analysis How data from mobile devices reveals the patterns of life that can make for stronger proactive and reactive investigations - on the street

More information

LAW PreDiscovery Software Training

LAW PreDiscovery Software Training LAW PreDiscovery Software Training LexisNexis University is the convenient location to register for your Litigation Software training. The University offers many delivery methods for your hands-on training

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Impact of Juniper Training and Certification on Network Management Activities

Impact of Juniper Training and Certification on Network Management Activities WHITE PAPER Impact of Juniper Training and Certification on Network Management Activities Sponsored by: Juniper Networks Cushing Anderson January 2014 IDC OPINION IDC believes sufficient training and appropriate

More information

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820 Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic

More information

Data Center. Business Intelligence. Enterprise Computing Solutions North America. Learning Solutions IBM Training. Brand Photo Here. arrow.

Data Center. Business Intelligence. Enterprise Computing Solutions North America. Learning Solutions IBM Training. Brand Photo Here. arrow. Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions North America Learning Solutions IBM Training Brand Photo Here arrow.com IBM Training At Arrow, we think Five Years Out.

More information

Your path to success. Become a Professional Fitness Trainer

Your path to success. Become a Professional Fitness Trainer Your path to success Become a Professional Fitness Trainer Life Time Academy is your path to becoming a qualified Professional Fitness Trainer, not just a certified one. We set you up for long-term career

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

Table of Contents. Introduction to MSAB Training Department... 01. Training Services Overview... 02. XRY Certification training...

Table of Contents. Introduction to MSAB Training Department... 01. Training Services Overview... 02. XRY Certification training... Training Courses Table of Contents Introduction to MSAB Training Department... 01 Training Services Overview... 02 XRY Certification training... 03 XRY Intermediate training... 04 Advanced Acquisition

More information

How To Be A Computer Forensics Examiner

How To Be A Computer Forensics Examiner Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) [email protected] EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner

More information

Become a Location Intelligence expert.

Become a Location Intelligence expert. Location Intelligence Training brochure Become a Location Intelligence expert. For more information, visit us online: mapinfo.com/support/training Become a Location Intelligence expert. Get more from your

More information

EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD

EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD White Paper EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD Explaining UFED Cloud Analyzer Extraction and Analysis Processes With data privacy a major topic of discussion among consumers and service

More information

All students must be proficient with a spreadsheet program and have the following courses (or their equivalent) prior to starting M.S. course work.

All students must be proficient with a spreadsheet program and have the following courses (or their equivalent) prior to starting M.S. course work. Accounting (M.S.) Accounting Admission Criteria and Degree Requirements Admission is open to individuals with a baccalaureate degree in accounting, business or any non-business discipline. Either the Graduate

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

CYBER FORENSICS (W/LAB) Course Syllabus

CYBER FORENSICS (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information

More information

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs 1 Contact us for more information +1 (800) 214 6371- USA +31 (10)

More information

Training Services Course Catalog TRAINING SERVICES

Training Services Course Catalog TRAINING SERVICES Training Services Course Catalog TRAINING SERVICES DESIRE2LEARN TRAINING SERVICES Desire2Learn will help you achieve your goals by teaching you how to use Desire2Learn products and develop more effective

More information

Certified Big Data Science Professional (CBDSP)

Certified Big Data Science Professional (CBDSP) Certified Big Data Science Professional (CBDSP) Training Preparation Program Quality & Organizational Excellence Division KnowLogic Professional Certifications Big Data Science Professional KnowLogic Professional

More information

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: [email protected] Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

Computer Forensics Preparation

Computer Forensics Preparation Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

More information

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in

More information

EMC ACADEMIC ALLIANCE

EMC ACADEMIC ALLIANCE EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. EMC ACADEMIC ALLIANCE EMC collaborates with colleges and universities worldwide

More information

Google Partner Academy, Singapore

Google Partner Academy, Singapore The Google Partner Academy is Singapore s premier training that condenses all the essential knowledge you need about Google AdWords, Analytics and into 6 dense days. This training is ideal for agency professionals,

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5

More information

Luna Community College Criminal Justice Program Associate of Arts Degree 2012 2015

Luna Community College Criminal Justice Program Associate of Arts Degree 2012 2015 Luna Community College Criminal Justice Program Associate of Arts Degree 2012 2015 Curriculum Profile Content Page Program Goals 2 Approvals 3 Degree / Certificate Requirements 4 & 5 Course Descriptions

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

Certification that packs a punch Become an MMA Conditioning Specialist

Certification that packs a punch Become an MMA Conditioning Specialist Certification that packs a punch Become an MMA Conditioning Specialist Life Time Academy is your path to becoming a qualified Mixed Martial Arts Conditioning Specialist (MMACS), not just a certified one.

More information

Table of contents. 1. Introduction. 1.1 Training Products. 1.2 Training Enrollment. 2. Advanced Architect Course. 3.

Table of contents. 1. Introduction. 1.1 Training Products. 1.2 Training Enrollment. 2. Advanced Architect Course. 3. Table of contents 1. Introduction 1.1 Training Products 1.1.1 Certification Courses 1.1.2 Tailored Training Sessions 1.1.3 Self-paced Online Training 1.2 Training Enrollment 1.2.1 How to enroll? 1.2.2

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

TRAINING. OneShield.com Leadership. Service. Technology. That s our policy.

TRAINING. OneShield.com Leadership. Service. Technology. That s our policy. SERVICES DATA SHEET TRAINING With specialized knowledge of global P&C insurance markets across all commercial, personal and specialty lines, OneShield s interactive training programs for business and IT

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) [email protected] www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

TELUS EMR Suite Wolf EMR

TELUS EMR Suite Wolf EMR TELUS EMR Suite Wolf EMR Enhanced patient care with electronic medical record. Better information. Better decisions. Better outcomes. TELUS EMR Suite: strength in numbers. In 2013 Your practice runs on

More information

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess

SANS CyberTalent VetSuccess Immersion Academy. VetSuccess SANS CyberTalent VetSuccess Immersion Academy P I L O T R E P O R T 2 0 1 5 VetSuccess For more than 25 years, SANS has been the leader in training and developing cybersecurity professionals. Like many

More information

For Your ediscovery... Software

For Your ediscovery... Software For Your ediscovery... Software is not enough Leading Provider of Investigatory and Litigation Support Services for Corporations, Governmental Agencies and Am Law Firms Worldwide. Our People Make the

More information

Sage University offers many training options for customers

Sage University offers many training options for customers Sage University offers many training options for customers Whether you are a new user ready to get started or an experienced user looking for training on what s new, Sage University is the right place

More information

EMC ACADEMIC ALLIANCE

EMC ACADEMIC ALLIANCE EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. Equip your students with the broad and deep knowledge required in today s complex

More information

Viewpoint ediscovery Services

Viewpoint ediscovery Services Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,

More information

RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University

RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh

More information

IAP2 Certification Program in Public Participation. planning communication techniques

IAP2 Certification Program in Public Participation. planning communication techniques IAP2 Certification Program in Public Participation planning communication techniques 1055 N. Fairfax Street, Suite 204 Alexandria, VA 22314 703.837.1197 703.837.9662 f www.theperspectivesgroup.com IAP2

More information

MITEL MICONTACT CENTER AND MIVOICE CALL ACCOUNTING TRAINING OPTIONS WHITEPAPER

MITEL MICONTACT CENTER AND MIVOICE CALL ACCOUNTING TRAINING OPTIONS WHITEPAPER MITEL MICONTACT CENTER AND MIVOICE CALL ACCOUNTING TRAINING OPTIONS WHITEPAPER SEPTEMBER 2013 ABOUT THIS DOCUMENT This document is intended to help Mitel Dealers and Sales representatives understand the

More information

Law Enforcement Analyst Certification Standards

Law Enforcement Analyst Certification Standards DEPARTMENT OF JUSTICE Global Justice Information Sharing Initiative United States Department of Justice Law Enforcement Analyst Certification Standards Based on the Law Enforcement Analytic Standards About

More information

Our full capabilities include:

Our full capabilities include: Network Services Network Services Connecting to greater performance Our Network Services division is comprised of a large staff with a breadth and depth of IT experience. We ll ensure your network is designed

More information

Diablo Valley College Catalog 2014-2015

Diablo Valley College Catalog 2014-2015 BUSAC Michael Norris, Interim Dean Business Division Math Building, Room 267 Possible career opportunities Study in accounting prepares students for careers in booking, private and public accounting, auditing,

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

TUV SUD Certified Cloud Computing Elementary Professional (TCCEP) Certification

TUV SUD Certified Cloud Computing Elementary Professional (TCCEP) Certification TUV SUD Certified Cloud Computing Elementary Professional (TCCEP) Certification Get Certified in the Technology that will Drive the Future ABOUT CLOUD COMPUTING DID YOU KNOW? Public cloud market will reach

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: JACS Code: Forensic Investigation

More information

IBM Software Services for Lotus Lotus Professional Certification Programs

IBM Software Services for Lotus Lotus Professional Certification Programs IBM Software Services for Lotus Lotus Professional Certification Programs Put your IT career into overdrive. The ladder to success just got easier to climb. If youõre a system administrator or application

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal

More information

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10

More information

Business Continuity Management Software

Business Continuity Management Software Business Continuity Management (BCM) Software 1 Business Continuity Management Software All In One Continuity Management Solution A Single Platform Approach Manage entire lifecycle with comprehensive BC

More information

Training Agendas and Pricing

Training Agendas and Pricing Training Agendas and Pricing Contents 1 Relativity Training Overview... 3 2 Relativity Administrative Training... 5 3 Relativity Analytics Training... 8 4 Relativity Assisted Review Training... 10 5 Relativity

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Leann Atoigue Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

The Business Value of IT Certification

The Business Value of IT Certification Sponsored by: Microsoft Authors: Cushing Anderson Matthew Marden Randy Perry The Business Value of IT November 2015 EXECUTIVE SUMMARY Business Value Highlights Higher productivity for server, database,

More information

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education RSA Archer Training Governance, Risk and Compliance Managing enterprise-wide governance, risk and compliance through training and education www.emc.com/rsa-training 1 RSA Archer Training Table of Contents

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

POWERFUL! Galileo. Professional Development. Professional Development for Galileo Users. Your Data Is. 1-800-367-4762 www.ati-online.

POWERFUL! Galileo. Professional Development. Professional Development for Galileo Users. Your Data Is. 1-800-367-4762 www.ati-online. Galileo Professional Development On-Site Online Professional Development for Galileo Users PROVIDED BY: ASSESSMENT TECHNOLOGY INCORPORATED Your Data Is POWERFUL! 6700 E. SPEEDWAY TUCSON ARIZONA 85710 Copyright

More information

Cisco Networking Academy Instructor Training Guidelines Revised January 2005

Cisco Networking Academy Instructor Training Guidelines Revised January 2005 Cisco Networking Academy Instructor Training Guidelines Revised January 2005 1-14 Cisco Networking Academy Instructor Training Guidelines v2.0 Copyright 2005, Cisco Systems, Inc. Table of Contents TRAINING

More information

How to Find a Good Computer Forensic Expert

How to Find a Good Computer Forensic Expert Finding the Right Computer Forensic Expert Craig Ball 2004 1 Finding the Right Computer Forensic Expert Craig Ball Is deleted-but-not-gone electronic evidence a bet the case concern? Ask convicted financier

More information

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will

More information

Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010

Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010 Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010 1 Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010

More information

UTB PeopleSoft Training Plan

UTB PeopleSoft Training Plan UTB PeopleSoft Training Plan The University of Texas at Brownsville April 2013 Table of Contents I. INTRODUCTION... 3 1.1 Goals of the Training Plan... 3 1.2 Overview of the Training Plan... 4 1.3 Assumptions...

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

INFS2608 ENTERPRISE DATABASE MANAGEMENT

INFS2608 ENTERPRISE DATABASE MANAGEMENT Business School School of Information Systems, Technology and Management INFS2608 ENTERPRISE DATABASE MANAGEMENT Course Outline Semester 1, 2015 Part A: Course-Specific Information Please consult Part

More information

MASTER OF SCIENCE IN NURSING

MASTER OF SCIENCE IN NURSING 300 MASTER OF SCIENCE IN NURSING Clarke University offers a Master of Science in Nursing degree in Nurse Educator and Family Nurse Practitioner programs, a post-master s certificate program and a master

More information

EMPCENTER COURSE CATALOG

EMPCENTER COURSE CATALOG EMPCENTER COURSE CATALOG WorkForce Academy and WorkForce Academy On Demand The key to using any software is proper training. First-class training, coupled with a commitment to the implementation, makes

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY RECOGNIZED MARKETABLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Bryan Rolle Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Apply today: strayer.edu/apply FLEXIBLE /

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Certification Programs

Certification Programs Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the

More information

Telecommunications Training Catalog

Telecommunications Training Catalog Open Enrollment & Contract Courses Online Training Customized Training Technical Assistance Telecommunications Training Catalog Boost Your Knowledge BitRate with Us! The Telecommunications Training Program

More information

LAKELAND BUSINESS ENGINEERING TECHNOLOGIES. Opportunity. and. starts HERE COMMUNITY COLLEGE. www.lakelandcc.edu

LAKELAND BUSINESS ENGINEERING TECHNOLOGIES. Opportunity. and. starts HERE COMMUNITY COLLEGE. www.lakelandcc.edu LAKELAND COMMUNITY COLLEGE BUSINESS Accounting Business Management Information & Computer Science Media Paralegal Studies and ENGINEERING TECHNOLOGIES Civil Engineering Computer Integrated Manufacturing

More information

SUPPLY CHAIN & LOGISTICS

SUPPLY CHAIN & LOGISTICS Diploma Program Length: 34 Weeks Microsoft Office Applications Microsoft Word Microsoft Excel Microsoft Outlook Business Communications Microsoft PowerPoint Office Procedures Introduction to Supply Chain

More information

www.allegrodev.com/allegro-u Training & Certification Allegro University

www.allegrodev.com/allegro-u Training & Certification Allegro University www.allegrodev.com/allegro-u Training & Certification Allegro University Two Types of Training Available Allegro training is available in a variety of training formats to provide students with flexible

More information

Director of Computer Forensic Services

Director of Computer Forensic Services www.orionforensics.com Call us:02-714-3801-3 Director of Computer Forensic Services I am a self-motivated person, with the ability to work unsupervised or as part of a team. As a Director and well-trained

More information