CEIB Education
  • Naslovna
  • Reference
    • Foto
    • Mediji
    • Kontakt
  • Biblioteka
Information and Communication Technology Forensics Investigation
​

21/ 22 / 23 February 2017​
Price 720 Euro - Belgrade
Registration on training
Pay by card - Price 575 Eur
Picture
2Checkout.com Inc. (Ohio, USA) is a payment facilitator for goods and services provided by CEIB Education.
Here you can learn how to:
  • Manage ICT Forensic Case
  • Provide First Incident Response
  • Conduct Forensics Procedures on Operating Systems, IP Network and Mobile Phones
 
Number of hours: 24
 
Target Audience:
This course program is designed for all IT professionals involved with information system security, computer forensics, and incident response. Highly recommended for ethical hackers, system administrators, bankers, security professionals, law enforcement professional, incident handlers, security officers, defense and military personal.
 
Duration:
3 Days (9h - 17h)
 
Certification:
At the end, participants will receive the Certificate of Achievement by Piperevski&Associates and CEIB – Septia Academy, signed by the Trainer.
 
Materials:
All attendances will receive Presentation slides with notes (at the end of the course), Knowledge base materials (with interesting articles, suggested exercises etc.), unique tools and scripts with lab exercise manual.
 
Labs Prerequisites:
Practical exercises in this course are labs based on BYOD (Bring Your Own Device) lab execution. This means that attendant must bring his own laptop and conduct lab exercises there. Minimum requirements for lab exercises at least 35GB HDD space, 4GB RAM memory and installed VMware Player 7.1.2 with ability to run virtual machines and host file system with the ability to read and write files that are larger than 3 GB. All lab exercises are done on virtual machines (Linux OS and Windows OS) that will be delivered on external media to the attendance at the beginning of the course. CAUTION (Do not store any sensitive data on your laptop since we will be accessing places on internet that might compromise your OS. If it happens then company that organize and the trainer of this course will not take any responsibility.)
Course Prerequisites:
  • Understand ethical hacking and its concepts
  • TCP/IP networking skills
  • Basic knowledge about Operating Systems
 
Course content:
1.Introduction to Information and Communication Technology Forensics Investigation
 
Lab: Getting inside Darknet-IT Crime Services Portal
 
2.Operating Systems Forensics
 
Lab: Data Acquisition and Recovery with CAIN and HELIX3
 
3.Network Forensics
 
Lab: Investigating Network Traffic
 
4.Applications Forensics
 
Lab: Working with Application Logs
 
5.Mobile Devices Forensics
 
Lab: Use of OSAF
 
6.Reporting
 
Unlike traditional courses, this course is intensive, very long and has highest level of difficulty
Powered by Create your own unique website with customizable templates.
  • Naslovna
  • Reference
    • Foto
    • Mediji
    • Kontakt
  • Biblioteka