Here you can learn how to:
Number of hours: 24
Target Audience:
This course program is designed for all IT professionals involved with information system security, computer forensics, and incident response. Highly recommended for ethical hackers, system administrators, bankers, security professionals, law enforcement professional, incident handlers, security officers, defense and military personal.
Duration:
3 Days (9h - 17h)
Certification:
At the end, participants will receive the Certificate of Achievement by Piperevski&Associates and CEIB – Septia Academy, signed by the Trainer.
Materials:
All attendances will receive Presentation slides with notes (at the end of the course), Knowledge base materials (with interesting articles, suggested exercises etc.), unique tools and scripts with lab exercise manual.
Labs Prerequisites:
Practical exercises in this course are labs based on BYOD (Bring Your Own Device) lab execution. This means that attendant must bring his own laptop and conduct lab exercises there. Minimum requirements for lab exercises at least 35GB HDD space, 4GB RAM memory and installed VMware Player 7.1.2 with ability to run virtual machines and host file system with the ability to read and write files that are larger than 3 GB. All lab exercises are done on virtual machines (Linux OS and Windows OS) that will be delivered on external media to the attendance at the beginning of the course. CAUTION (Do not store any sensitive data on your laptop since we will be accessing places on internet that might compromise your OS. If it happens then company that organize and the trainer of this course will not take any responsibility.)
Course Prerequisites:
Course content:
1.Introduction to Information and Communication Technology Forensics Investigation
Lab: Getting inside Darknet-IT Crime Services Portal
2.Operating Systems Forensics
Lab: Data Acquisition and Recovery with CAIN and HELIX3
3.Network Forensics
Lab: Investigating Network Traffic
4.Applications Forensics
Lab: Working with Application Logs
5.Mobile Devices Forensics
Lab: Use of OSAF
6.Reporting
Unlike traditional courses, this course is intensive, very long and has highest level of difficulty
- Manage ICT Forensic Case
- Provide First Incident Response
- Conduct Forensics Procedures on Operating Systems, IP Network and Mobile Phones
Number of hours: 24
Target Audience:
This course program is designed for all IT professionals involved with information system security, computer forensics, and incident response. Highly recommended for ethical hackers, system administrators, bankers, security professionals, law enforcement professional, incident handlers, security officers, defense and military personal.
Duration:
3 Days (9h - 17h)
Certification:
At the end, participants will receive the Certificate of Achievement by Piperevski&Associates and CEIB – Septia Academy, signed by the Trainer.
Materials:
All attendances will receive Presentation slides with notes (at the end of the course), Knowledge base materials (with interesting articles, suggested exercises etc.), unique tools and scripts with lab exercise manual.
Labs Prerequisites:
Practical exercises in this course are labs based on BYOD (Bring Your Own Device) lab execution. This means that attendant must bring his own laptop and conduct lab exercises there. Minimum requirements for lab exercises at least 35GB HDD space, 4GB RAM memory and installed VMware Player 7.1.2 with ability to run virtual machines and host file system with the ability to read and write files that are larger than 3 GB. All lab exercises are done on virtual machines (Linux OS and Windows OS) that will be delivered on external media to the attendance at the beginning of the course. CAUTION (Do not store any sensitive data on your laptop since we will be accessing places on internet that might compromise your OS. If it happens then company that organize and the trainer of this course will not take any responsibility.)
Course Prerequisites:
- Understand ethical hacking and its concepts
- TCP/IP networking skills
- Basic knowledge about Operating Systems
Course content:
1.Introduction to Information and Communication Technology Forensics Investigation
Lab: Getting inside Darknet-IT Crime Services Portal
2.Operating Systems Forensics
Lab: Data Acquisition and Recovery with CAIN and HELIX3
3.Network Forensics
Lab: Investigating Network Traffic
4.Applications Forensics
Lab: Working with Application Logs
5.Mobile Devices Forensics
Lab: Use of OSAF
6.Reporting
Unlike traditional courses, this course is intensive, very long and has highest level of difficulty