|
[PyFeyn] Digital and Computer Forensics & Investigations TrainingSkills for Africa Training Institute workshops at skillsforafrica.or.keTue Jan 31 12:07:18 GMT 2023
Digital and Computer Forensics & Investigations Training Dates Fees Location Apply 06/02/2023 - 17/02/2023 $3000 Mombasa <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4C8Cz3Qp86CPaPqTxpIlA6KWliqbpEJ3KuWJA49Zuq3k64uP7g51gYiOGIcX4-u9wboYzSpu8uglj_iU3sR2cLlS1_NDHe1Jk1heqOMjMLdoCk0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujllohukcUiu3kVS2iQPxT8y1GNOGGmfEklsCIckSR4oqH3yPgY5rGAad0hexhC-ZBBQGsV4VzhQNFin8OOyv8IwdmjmsdLKoKcDkZvjXTBt7TbH4d0> Online Class 06/03/2023 - 17/03/2023 $2700 Nairobi <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4CQY2EqMxsGH_7rhiIWG2qaw6n39T5fP9jKtiHak4JogFIVjxPFRT9s8NkauWwkinDMuMoFe3-l9yPAoi4R7BzmbFKcmPWAwHirMAaqQlbtoUP0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujlloh5uBGkIdexyFFXiIz75TeHrZz1hZ7Z7UmTuknKznCU53DPjUGXGD2vTUr-3YwNecxX4DBHuWnExlP7vXf-OTXCTh9bduJqIk07jqCwdPDTW6B0> Online Class 10/04/2023 - 21/04/2023 $2700 Nairobi <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4CAP3RRbSDhPVfW55DO7jskOWAqyppsYDlbvMnvoweZB-1pQA7hDSLNXYs7f4LRbnGQU0_BH-I_dsPF89M5RfsgjGquVsND8Qm6ycdBsxuDpw-0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujllohBNNqyiVdhiPensIsfvXgcyUl6JcDP2p7J4DxXkg85BKy5TjTjU8jnnR_Iwb3RrJ7Q0_qTr7j3uYg8PLDxCNMsZ3W5migmG6_rewLDJnwtTgn0> Online Class 08/05/2023 - 19/05/2023 $4500 Dubai <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4CSGKredyXY4TXhApldHOtMJLZ6T7r7Dww_s0lVBGzNGmMSHkYnz0_JLHw_uNXQvO0UjI07gA7wqECprlK1Qvy5rNyjbr0keBUt0YMDbxVDElR0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujlloh8MWg5R_hQ6N0HG_9MCVSbe2YUmHsikMl8LcpBck3PLIo2gKdRkKGgDfqiXH2EMcqozqC0AgNyrwx0sskBFUQJ4PU-js8oMmEhWe9FM3sCNgZ0> Online Class 12/06/2023 - 23/06/2023 $3000 Mombasa <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4Cm-JbC6ngjrC3k4p7hcwiTxsvaHbFafbXs6CD_sAKP910CAx_UqoJBj07zF9z87QUvaUyp7qhVivU0j4d_Vji8HR7d9lLs6-IBCZxWEyS7GLA0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujllohZYLV9YXln3ZrL_8Emp6kAdNt4n1AICGgUtbJLsdFXk2Iz96hdVE4o7XgYqAc2zq7gaxEfd7ozp7QWk0Tdjcohu_YmtVNmmxceXFkzq4TrS1T0> Online Class <https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KM-cgdd93er8oiDD9RVWshioX_mIbzdawPjhz4HtxsxVzPwYyHp1iBOMz5KFkeAgpB6Fq69h_OGwOkihIqJfxzdDKAnt_qtyM6z-VhK4FSLE9A1> Contact us <https://133IK.trk.elasticemail.com/tracking/click?d=TdO1gCuQ71hpWL60BWNntuwf2IWJfk_kJQ_Oex5_ejgzraWhWpdtWgRu_Blx4JbkvGn3yliVHRwmY9gJKNEjvu2xOJF6YXEBjHpO9a-kl2cXkiM2iHDeAw0kzWouSeAIg3ucx8siDbz9a-PSjqIA6Dk1> Whatapp INTRODUCTION Computer and Mobile Forensics teaches you how to identify, preserve, extract, analyze and report forensic evidence on computers and mobile devices. You will learn about the challenges of computer and mobile forensics, walk through the process of analysis and examination of operating systems and mobile devices, and gain a deep understanding of differences in evidence locations and examination techniques on Windows and Linux computers and Android, iOS and Windows phones.The course provides trainees with a practical based understanding of the methodologies, tools and techniques used in computer forensic and investigation in digital environment. The course content covers acquisition, collection, seizure and preservation of evidence handling, interpretation and final reporting and presentation of findings. COURSE OBJECTIVES After competing this course, you will be able to: Understand the fundamentals of digital forensics and explain the need for mobile device forensics Understand the threats associated with mobile devices Classify evidence types on mobile devices and evidence acquisition types Explain different mobile hardware architecture Develop a mobile forensics investigation process Use various forensic tools for investigation Investigate mobile security breaches and identify the criminal Restore the data and generate reports for future threats/attacks analysis Gathering volatile and non-volatile data from Windows and recouping erased documents from Windows, Mac OS X, and Linux. Researching password secured documents by utilizing password cracking concepts and tools Roles of the first responder, first responder toolkit, securing and assessing electronic crime scene, directing preliminary interviews, archiving electronic crime scene, gathering and safeguarding electronic proof, bundling and transporting electronic crime scene, and detailing electronic crime scene. Setting up the computer forensics lab and creating investigation reports. Steganography, Steganalysis and image forensics. Kinds of log capturing, log management, Investigation logs, network traffic, wireless attacks, and web assaults. DURATION 10 Days WHO SHOULD ATTEND This training course is suitable to a wide range of professionals but will greatly benefit: Information Security Professionals, Cyber Security officers, Security Officers,Computer Forensic Analyst, Forensic and Network Investigators , Law Enforcement Officials,Ethical Hacking Expert, Digital Forensics Investigators, Risk Assessments Professionals, Mobile Developers, anyone who deals with implementation, testing, security hardening of mobile devices. COURSE CONTENT Module 1 Course introduction Computer forensics and investigation as a profession Define computer forensics Describe how to prepare for computer investigations and explain the difference between law enforcement agency and corporate investigations Explain the importance of maintaining professional conduct Digital evidence — legal issues Identifying digital evidence Evidence admissibility Rules of evidence What is seizure? Consent issues Expert witness Roles and responsibilities Ethics Investigations Investigative process Incident response E-discovery Criminal vs. civil vs. administrative investigations Intellectual property Reporting Quality control Evidence management Current computer forensics tools and hardware Module 2 Forensic science fundamentals Principles and methods Forensic analysis process Hardware Storage media Operating system File systems Erased vs. deleted Live forensics Module 3 File and operating system forensics Keyword searching Metadata Timeline analysis Hash analysis File signatures Volume Shadow Copies Time zone issues Link files Print spool Deleted files File slack Damaged media Registry forensics Multimedia files Compound files Web and application forensics Common web attack vectors Browser artifacts Email investigations Messaging forensics Database forensics Software forensics Malware analysis Module 4 Network forensics TCP/IP Types of attacks Wired vs. wireless Network devices forensics Packet analysis OS utilities Network monitoring tools Anti-forensics Hiding Steganography Packing Hidden devices (NAS) Tunneling/Onion routing Destruction Spoofing Log tampering Live operating systems Module 5 New & emerging technology Legal issues (privacy, obtaining warrants) Social networks forensics Types of social networks Types of evidence Collecting data Virtualization Virtualization forensics Use of virtualization in forensics Cloud forensics Types of cloud services Challenges of cloud forensics Big data Control systems and IOT Mobile forensics introduction Types of devices GPS Cell phones Tablets Vendor and carrier identification Obtaining information from cellular provider GSM vs. CDMA Common tools and methodology Module 6 Mobile forensics process Mobile forensics challenges Types of evidence found on mobile devices Collecting mobile devices at the scene Comparison of mobile operating systems Data acquisition methods Reporting findings Android forensics Android platform Android security model Bypassing Android security features Android logical data acquisition and analysis Android physical data acquisition Module 7 iOS forensics Apple iOS platform iOS security Bypassing iOS security features iOS data acquisition and analysis iPhone/iCloud backups iOS data recovery techniques Windows phones Windows Phone OS: partitions and filesystems Windows Phone security features Windows Phone logical acquisition and analysis Windows 10 mobile OS forensics Feature phones forensics Acquiring and examining data from feature phones NB: This a full practical oriented training. Participants are required to have laptops. THE END <https://133IK.trk.elasticemail.com/tracking/unsubscribe?d=8rwWJSuJLGL8NOFPwPzUnbJUfKi9GOgBKSgQ84g7rPdp9gaZYm3yaeFS3Q4cdT3e_Gv8-UDJuXiFIPwUazMGf52TlGo-Lf3jInVv-_2f1he90> UNSUBSCRIBE -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://www.hepforge.org/lists-archive/pyfeyn/attachments/20230131/6981389d/attachment.html>
More information about the PyFeyn mailing list |