Hands-On How-To Computer Forensics Training

Similar documents
e-discovery Forensics Incident Response

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

EC-Council Ethical Hacking and Countermeasures

Certified Digital Forensics Examiner

Computer Hacking Forensic Investigator v8

Overview of Computer Forensics

CERTIFIED DIGITAL FORENSICS EXAMINER

CDFE Certified Digital Forensics Examiner (CFED Replacement)

MSc Computer Security and Forensics. Examinations for / Semester 1

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

To Catch a Thief: Computer Forensics in the Classroom

Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Digital Forensic Techniques

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Chapter 7 Securing Information Systems

Digital Forensics. Larry Daniel

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Modern Digital Forensics!!

Where is computer forensics used?

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

CCE Certification Competencies

Scene of the Cybercrime Second Edition. Michael Cross

Computer Forensics Basics, First Responder, Collection of Evidence

What is Digital Forensics?

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

On the Trail of the Craigslist Killer: A Case Study in Digital Forensics

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Computer Forensic Tools. Stefan Hager

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

CYBER FORENSICS (W/LAB) Course Syllabus

introducing COMPUTER ANTI FORENSIC TECHNIQUES

Investigation Techniques

Certified Cyber Security Analyst VS-1160

Journal of Digital Forensic Practice

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

EnCase v7 Essential Training. Sherif Eldeeb

How To Get A Computer Hacking Program

State of the art of Digital Forensic Techniques

Computer Forensics Principles and Practices

Incident Response and Forensics

EnCase Portable. Extend Your Forensic Reach with Powerful Triage & Data Collection

Term Report. Forensics for IT

Best Practices for Incident Responders Collecting Electronic Evidence

Information Technology Services Guidelines

Digital Forensics for Attorneys Overview of Digital Forensics

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

Incident Response and Computer Forensics

Master of Science in Information Systems & Security Management. Courses Descriptions

Computer Forensics CHAPTER

Loophole+ with Ethical Hacking and Penetration Testing

Build Your Own Security Lab

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

InfoSec Academy Forensics Track

Design and Implementation of Digital Forensics Labs:

Full Drive Encryption Security Problem Definition - Encryption Engine

Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response

Security Forensics Training

Certified Cyber Security Analyst VS-1160

Computer Forensics as an Integral Component of the Information Security Enterprise

A Short Introduction to Digital and File System Forensics

System Security Policy Management: Advanced Audit Tasks

EnCase 7 - Basic + Intermediate Topics

Digital Forensics, ediscovery and Electronic Evidence

Useful Computer Forensics Tools Updated: Jun 10, 2003

Digital Forensics for Attorneys - Part 2

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

Case Study: Smart Phone Deleted Data Recovery

Certified Secure Computer User

plantemoran.com What School Personnel Administrators Need to know

USB Portable Storage Device: Security Problem Definition Summary

Getting Physical with the Digital Investigation Process

(b) slack file space.

[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.]

Battling Current Technological Trends

What You Should Know About ediscovery

FORBIDDEN - Ethical Hacking Workshop Duration

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Computing forensics: a live analysis

Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374

Responding to the Digital Crime Scene: Gathering Volatile Data

Transcription:

j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE /kvawuf1xq0px0a2ocjpm/no9cramming...j75nx9avfpqb8blq6murfdmziz MDok/76 VekyCzsAAgIIANnG7yLuELGDY2m5muBTfjTUcef4gi+ea/nptFB/Ql+ YO5Ag 3q MDo VekyCzk/76NolBootnCamps...oDcS7esD0a2ocj6/ MDok/76Y 71qlC8wXo+VMROU+028W65Szgg2gGnVqMU6Y9AVfPQB8bLQ6mUrfdMZIZJ+AyD XaNUu/It1TQHSi7jb3HZNo2CrashhCourses...OKLbRXF/j5jJQPxXaNUu/It vawuf1xq0px0a2ocj6h0tt0pwg5plyktkd/p2ntvfx82j6taqtcnmma7ayhsio 2GkHrAWG5plYKTkd/P2 NoxCertifications...hQAECwMCAQIZAQAKCRDafWs Ok3jWApxxB+4VnVnsHitSj8+VMROU+028W65Szgg2gGnVqMU6/mjsBADJCqQMX 3q MDok/76YO5Ag aoe3nodinformation/dumps...glrpbvuf7rc4kpvt73hk 1qlC8wXo+VMROU+028W65Szgg2gGnVqMU6Y9AVfPQB8bLQ6mUrfdMZIZJ+AyDv h8+qq9 GWG5plYKTkgNoe(Web-Based)qLectures...j8FM6PmLNqq3ghDgOuC /xm+aygg9 MDok/76YO5Ag 06Lkwtu+SIfCtz7GTvf/wfEbGMtvzXdswdAgZ2dS 0a7AYY9VaWuF1XQ0PX0a2ocj6H0Tt0pWG5plYKTkd/P2NtVfWE5JqcYxX22azN Training VaWuF1XQ0PX0a2ocj6H0Tt0pWG5plYKTkd/P2NtVfX82j6TaqTCnMMa7AYhSIO 2GkHrAcHow-TodInstructionsoPrGySbf2c0Eql35yWNt9j+/b6f7kcOk3jWA /mjsbadfxnmzvqg5lnsjjcqhnsnn65aqmreal-world2simulationsumrhnsn gtypmicq8mua7lg3fijk0wkzszmsgzcfscgbpnqwfxluh7gsplqstmv0u2vjdx dhkdhands-onfexercisesgu29sdxrpb25zidxpbmzvqg5ldhnlmnvbt6jafqe Uafn/QCjMTQHfQTB8EGBECAAwFAj0OsCx ExpertcInstructorszVxCAAwFAj+ hamfcqhihqaecwmcaqizaqakcrdafwsaonhzrmaeaj9yabw8v2fgxaqji9/vft 02jjdklhaMFCQHiFsxSmalleClassoSizesIZAQAKCRDfWsAOHzRmAeAJ9yABw q3ghdgoucsm/ lxitvjlhd&nm0/xwxv0ojhrhs3jmtqhsiyeumrhnsnn65aumhl VekyCTailoredcCourseszsAAgIIANnG7yLuELGDY2UpdatedzContent1FeI7 1XQ0PX0a2ocj6H0Tt ffstjvbzyspixnu 1j9WE5J2CtJ3k2gpXI61Brwv0YAWC deralbitjaudarsenalbofwsecuritymtake-awaysv8nqvegbef90g+zvxoeh AjOuCsM/Ach5ZVKZETT7gURoaqTG8KXipdQgtYWdXfSjxsZObybhCXHfV1HHVa CzsumtmAeAJ9yABw8KCRDafWsAOv2f2x1Post-TrainingkSupportlhaMFCQH F CQHihQAECwFQ hakcrdafw0sbf2c0eqlvekyczsaagiianng7yluelgdy2m5m QAE35yW2jj SatisfactionrGuaranteedlhaMFCQHihQAECwMCAQIZAQAKCRDa dklhamfcqhihqaecwmcaqizaqakcrdafwsaonoklbrxf/j5jjqpxxanuu/it1t HzRmAeAJ9yABw8v2fGxaqJI9/VftzMOKLbRXF/j5jJQPxXaNUu/It1TQHSiyEu

Course Overview: Digital information continues to grow at an exponential rate. Data is no longer stored solely in computer hard drives, backup tapes, or compact discs (CDs). With the growth of emerging portable data and storage devices, such as portable digital assistants (PDAs), cell phones, and Blackberry devices, crucial information can be anywhere and easily passed from device-todevice. Information stored in these changing media can be crucial sources of evidence in corporate, civil, and criminal investigations. Moreover, forensic investigation is a time-consuming effort that requires specialized expertise, procedures, tools, and real-world knowledge of excavating digital evidence. NetSecurity's course teaches students the step-by-step process of locating, acquiring, preserving, analyzing, and producing solid digital evidence. The Hands-On How-To Lab Exercises (HOHTLEs) covered in the course incorporate significant real-world experience necessary for delivering world -class results in the field. NetSecurity Benefits: Through years of real-world hands-on security and forensics experience, NetSecurity has supported Fortune 500 companies and federal agencies such as the IRS, DHS, VA, BBG, DOL, NSF, and DoD. The benefits of our Hands-On How-To Computer include: Skills to establish and fortify an organization s security, forensics, and incident response capabilities Customized private sessions, tailored towards organizations unique environments Detailed step-by-step and how-to instructions Instructor-led and student-performed hands-on exercises Real-world simulations of forensics challenges Seasoned expert instructors with real-world hands-on consulting and training experience Arsenal of take-aways (tools, templates, guides, and relevant forensics resources) Up-to-date course content, addressing emerging forensics challenges Small class sizes ensuring maximum student-instructor interaction Vendor-neutral content covering commercial and freeware tools Target Audience: The course is targeted towards technical professionals, including: Computer Investigators Law Enforcement Personnel Information Security Managers Incident Responders IT Professionals Cyber Crime Attorneys Private investigators Compliance Officers Auditors

Course Format: Interactive presentations by security and forensics expert instructor Hands-On How-To Lab Exercises (HOHTLEs) in performing computer forensics and incident response Course Duration: Three (3) Days Course Cost: $2,995 (List Price) Course Objectives: Upon successful completion of the course, each participant will be armed with the knowledge, tools, and processes required in producing computer evidence that can withstand legal scrutiny. Specifically, students will possess relevant knowledge and real-world hands-on skills in: Requisite technology knowledge relevant to forensics investigations Laws relating to computer crime investigations Tried and proven forensics investigation processes Getting an organization ready for forensics investigations tools and techniques of the trade Evidence acquisition and duplication How-to analyze evidence for forensics artifacts Performing forensics analysis of common operating systems Internet forensics Analyzing Mobile device Passwords and encryption Information recovery Capturing volatile data from a live computer Conducting memory analysis Analyzing malware and conducting reverse engineering Developing forensics reports Testifying in courts Anti- techniques

Course Topics: NetSecurity s Computer course includes in-depth coverage of real-world scenarios and HOHTLEs in the following areas: Topics Discussion and HOHTLEs Computer Overview Computer Fundamentals Computer File Systems Computer Hard Drive Structure Hard Disk Interfaces (SCSI, IDE, USB, SATA, etc.) Mobile Storage Devices Windows, Linux, and Macintosh Boot Processes Hard Drive Erasure and Degaussing Virtualization and Virtual Machines (Parallels, VMware, etc.) Networking Technology Fundamentals of Networking The Open System Interconnect (OSI) Model The TCP/IP Model TCP/IP Protocol Addressing Overview Computer Fundamentals Benefits of Computer Computer Crimes Computer Evidence Computer Evidence and Courts Laws Justice System Legal Concerns and Privacy Issues The Fourth Amendment Internet Laws and Statutes Process The Process Steps in Investigations Authentication and Verification of Suspects Identification of Evidence Source Securing the Evidence Chain of Custody Form Professional and Unbiased Conduct Law Enforcement Methodologies Collaboration: Working with Upstream and Downstream Providers Collaboration: Dealing with Law Enforcement Collaboration: Dealing with the Media Collaboration: Working With Other Organizations

Topics Discussion and HOHTLEs Evidence Evidence Sources Evidence Seizure Evidence Collection: Duplication and Preservation Evidence Collection: Verification and Authentication ( Soundness) Evidence Collection: Order of Volatility Evidence Integrity: Preventing Tampering and Spoliation Evidence Collection: Bagging, Tagging, Marking, Secure Storage and Transmittal of evidence. Evidence Handling: Chain of Custody Handling and Securing Evidence Toolkits Common Toolkits Uncommon Tools Creating Toolkits Acquisition and Duplication Sterilizing Evidence Media Forensic Duplication of Source Evidence with Hardware Acquiring Image with Software Acquiring Live Volatile Data Using Write blockers Data Analysis Metadata Extraction File Signature Analysis File System Analysis Examining Unallocated and Slack Space Identifying Known Bad/Good Files Performing Searches Data Carving Recovering Deleted Data and Partitions Windows Registry Fundamentals and Analysis Executable File Analysis Windows Live Response Alternate Data Stream (ADS) Recycle Bin Windows Prefetch Files Evidence Recovery from Print and Spool Files Simulating/Booting Suspect Environment

Topics Discussion and HOHTLEs Internet Domain Name Ownership Investigation Reconstructing Past Internet Activities and Events Email : E-mail Analysis Email : Email Headers and Spoofing Email : Laws Against Email Crime Messenger : AOL, Yahoo, MSN, and Chats Browser : Analyzing Cache and Temporary Internet Files Browser : Cookie Storage and Analysis Browser : Web Browsing Activity Reconstruction Mobile Device Introduction to Handheld Collecting and Analyzing Cell Phone, PDA, Blackberry, iphone, ipod, and MP3 Evidence Analyzing CD, DVD, Tape Drives, USB, Flash Memory, and other Storage Devices Digital Camera Reconstructing Users Activities Recovering and Reconstructing Deleted Data Passwords and Encryption Files and Data Encryption Password Attacks Tools and Techniques Working with Rainbow Tables Passwords and Storage Locations Encryption Types (Symmetric and Asymmetric) Password Cracking and Recovery Steganography Steganography Overview Steganography Tools and Tricks Data Hiding Data Recovery Volatile Data Collection and Analysis on a Live Windows System Collection and Analysis on a Live Linux System Collection and Analysis on a Live Mac OS System Collection and Analysis of Physical and Process Memory Volatile Evidence in Incident Response Court Admissibility of Volatile Evidence Memory Memory Fundamentals Memory Data Collection and Examination Extracting and Examining Processes

Topics Discussion and HOHTLEs Malware Analysis Malware Analysis Basics Analyzing Live Windows System for Malware Analyzing Live Linux System for Malware Analyzing Physical and Process Memory Dumps for Malware Discovering and Extracting Malware from Windows Systems Discovering and Extracting Malware from Linux Systems Rootkits and Rootkit Detection and Recovery Reverse Engineering Tools and Techniques Resources Forms and Checklists Presentation and Reporting Writing Computer Forensic Reports Report Requirements Guidelines for Writing Final Reports Sample Forensic Report Court Testimony Credibility and Success in Court Testifying in Court Expert Witness: The Expert Witness Expert Witness: Becoming an Expert Witness Expert Witness Testimony Evidence Admissibility Anti- Anti- Tools and Techniques (Data Hiding, Steganography, Encryption, Deletion of Data) Defeating Anti-Forensic Schemes Erasing Evidence More information: For more information about NetSecurity s Hands-On How-To Training, please contact us at Training@NetSecurity.com or call 1-866-66-HOW-TO (1-866-664-6986).