Certified Digital Forensics Expert (CDFE)

by IIS (Institute of Information Security) Claim Listing

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IIS (Institute of Information Security) Logo

img Duration

Please Enquire

Course Details

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence.

NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 years.

It now brings together its consolidated expertise into a four-day hands-on training on Certified Professional Forensic Analyst (CPFA).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach.

 

Key Benefits Of Course:

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. NII Consulting has been providing professional computer forensics, cyber breach investigation, incident detection and response services to clients for more than 5 the past four years.

It now brings together its consolidated expertise into a four-day hands-on training on Certified Digital Forensics Expert (CDFE).The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach explaining start to end of digital forensics investigation, incident detection and response.

 

What Should One Do When There Is A Suspicion Of A Computer-based Crime?

  • What tools and techniques are most likely to yield the right set of clues?
  • What is the procedure to deal with incident response and remediation?
  • How should the investigation be carried out such that it can be presented in a court of law?
  • Demonstration with the worlds’ leading forensics tool – Encase
  • Working with Forensics Distros like SIFT, DEFT, etc.
  • Who should attend this course?
  • Auditors and financial fraud examiners
  • Chief Security Officers and Chief Technology Officers
  • Professionals seeking a career in computer forensics and cybercrime investigations
  • Security and Network Administrators

 

Table of Contents:

  • Session 1: Introduction to computer forensics
  • Session 2: Setting up a Computer Forensics Lab
  • Session 3: How to approach to crime scene
  • Session 4: Computer Investigation Process
  • Session 5: Forensic Imaging of the evidence
  • Session 6: Forensic Analysis of the evidence
  • Session 7: Steganography
  • Session 8: Email Crimes
  • Session 9: Investigating Network & log
  • Session 10: Mobile Forensics
  • Session 11: Forensic Report Writing
  • Session 12: Types of investigation
  • Session 13: Becoming an Expert witness
  • Pune Branch

    2nd Floor, Kataria Chambers, ITI Rd, Above Reliance Footprint, Pune
  • Mumbai Branch

    204, Ecospace Tower, 2nd Floor, Mumbai

Check out more Computer Forensics courses in India

S-Link Cyber Solutions Logo

Digital Forensics Course

Digital forensics is a key component in Cyber Security. Many people hear the term forensics, or computer forensics, or digital forensics and instantly think, that’s just for law enforcement, but the truth is, digital forensics has a key place on every cyber security team.

by S-Link Cyber Solutions [Claim Listing ]
HB Education Logo

Check Point Fire Wall Training

HB Educational Services provide excellent training for checkpoint firewall training in Chennai with placements. Our trainers are well experienced professionals working in MNC’s.

by HB Education [Claim Listing ]
HB Education Logo

Forensics Investigator Training

Forensics Investigator is the process of detecting hacking attacks and properly extracting proof to report the crime and conduct an investigation to prevent future attacks.

by HB Education [Claim Listing ]
Josh Innovations Logo

Cyber Security

Cyber Security course is offered by Josh Innovations for all skill level. Josh Innovations is a leading software training institute providing Software Training, Project Guidance, IT Consulting and Technology Workshops.

by Josh Innovations
Leosias Technologies Logo

CyberSecurity

CyberSecurity course is offered by Leosias Technologies. Get trained with classroom training, live classes, recorded video classes, assignments, assessments, quizzes, real-world projects, and case studies. 

by Leosias Technologies [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy