Certified Digital Forensics Expert (CDFE)

by IIS (Institute of Information Security) Claim Listing

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IIS (Institute of Information Security) Logo

img Duration

Please Enquire

Course Details

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence.

NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 years.

It now brings together its consolidated expertise into a four-day hands-on training on Certified Professional Forensic Analyst (CPFA).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach.

 

Key Benefits Of Course:

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 the past four years.

It now brings together its consolidated expertise into a four-day hands-on training on Certified Digital Forensics Expert (CDFE).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach explaining start to end of digital forensics investigation, incident detection and response.

 

What Should One Do When There Is A Suspicion Of A Computer-based Crime?

  • What tools and techniques are most likely to yield the right set of clues?
  • What is the procedure to deal with incident response and remediation?
  • How should the investigation be carried out such that it can be presented in a court of law?
  • Demonstration with the worlds’ leading forensics tool – Encase
  • Working with Forensics Distros like SIFT, DEFT, etc.
  • Who should attend this course?
  • Auditors and financial fraud examiners
  • Chief Security Officers and Chief Technology Officers
  • Professionals seeking a career in computer forensics and cybercrime investigations
  • Security and Network Administrators

 

Table of Contents:

  • Session 1: Introduction to computer forensics
  • Session 2: Setting up a Computer Forensics Lab
  • Session 3: How to approach to crime scene
  • Session 4: Computer Investigation Process
  • Session 5: Forensic Imaging of the evidence
  • Session 6: Forensic Analysis of the evidence
  • Session 7: Steganography
  • Session 8: Email Crimes
  • Session 9: Investigating Network & log
  • Session 10: Mobile Forensics
  • Session 11: Forensic Report Writing
  • Session 12: Types of investigation
  • Session 13: Becoming an Expert witness
  • Pune Branch

    2nd Floor, Kataria Chambers, ITI Rd, Above Reliance Footprint, Pune
  • Mumbai Branch

    204, Ecospace Tower, 2nd Floor, Mumbai

Check out more Computer Forensics courses in India

Studide Logo

Cyber Security Training

The technique of protecting internet-connected systems such as computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as cybersecurity. We can divide cybersecurity into two parts one is cyber, and the other is security.

by Studide [Claim Listing ]
Cyber Secguru Logo

Computer Hacking Forensic Investigator

The Computer Hacking Forensic Investigator (CHFI) course is designed to provide individuals with the knowledge and skills needed to conduct digital forensics investigations in a variety of contexts, including criminal investigations, civil litigation, and internal corporate investigations.

by Cyber Secguru [Claim Listing ]
SaturnX Academy Logo

Digital Forensics Master

SaturnX Academy Digital Forensics Master is a professional who specializes in the field of digital forensics. Digital forensics involves the collection, analysis, and preservation of digital evidence to investigate and prevent cybercrimes and other digital-related incidents.

by SaturnX Academy [Claim Listing ]
Redback Academy Logo

CISO

A chief information security officer (CISO) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.

by Redback Academy [Claim Listing ]
QAI Global Institute Logo

Certified Cloud Security Professional (CCSP)

The CCSP exam tests your skills in six domains. The domains draw from a range of cloud security topics within the (ISC)² Common Body of Knowledge (CBK).

by QAI Global Institute [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy