Digital and Computer Forensics & Investigations Training
Skills for Africa Training Institute
workshops at skillsforafrica.or.ke
Tue Jan 31 12:10:42 UTC 2023
Digital
and Computer Forensics & Investigations Training
Dates
Fees
Location
Apply
06/02/2023 - 17/02/2023
$3000
Mombasa
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4CyvzZxPsLFKJ_kkDt1FLyw-0_F2Od2tV4irdHYWSQmi-5TDugT4caf1lAxUCfGIMtgjR226KFpsOFQlJ1ZVizQUewA4WjQF7x4IB1AUWmhq-M0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujllohmG1SF_RkT_HXMX4N0edv9ZbAqEK31Q8ZwPvF3vGtqZUbGYBtaPsR_KERl9ZZ3pN_hhqfBKIjGGX-2w-Fjyvxb7ey4G4onrgTL-l2Ad-Th4Gx0>
Online
Class
06/03/2023 - 17/03/2023
$2700
Nairobi
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4Cw9JmDQIPdFi4UPS2pblbZODIf_R4vCFylRJTLViPwFQLXe0kn8zDQU7i_Gg7JT1rcJKkUDU-yJ7orRMBQJ7BjYHGRZc5jZlF2O5ElIqH6mEU0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujllohKorMUAWdfxMgUZOr-VDXhwg4izM0TMpEHmJqRzM7r4FzQtvcRcrNSKACNHzP5Q1lmhMN8HnQIzKFSDw6q63cB0Z4ilj3nSwm7AjBCAwlrSM_0>
Online
Class
10/04/2023 - 21/04/2023
$2700
Nairobi
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4Cn4E4o0Lhqkq4epvKX-I763mx602uyipVroB3q_rgjIXhbJgbKAVmCsdE0wUmmMb-yI9V9D-LX4oXbW4O1xZk0Syu2pj36YhO3TmtxEW4z-LF0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujllohhui1kfNbL3k3a_wLOB5CzyCmkssk7t3I6MR-68jZvScblRyfDgj853kdzyVBPGViQJBPEK54CHPjbO9WHyLsbyzK4b8AUyOrU8E7Nn2rgdKP0>
Online
Class
08/05/2023 - 19/05/2023
$4500
Dubai
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4CNZC55S0ByBiIdFMKmZMFrWqeiYG72plW_KCK7ZAR7QC1WF86rNvZHQNBwsIYH_WsMytheDLvB8U-aWZFWo_aijxwxtcnkpvaEm_OjMrgpf940>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujllohQT8RJCWijtrSYeS-j9L8MA2-v3U1F1KwQauku1ZJj_E2F74Ej4tYg7VYS91XRqvP1Sb_oyap5FOXDFPypWIG_pbrOd1Agg5_HOPnO9LZJ8P30>
Online
Class
12/06/2023 - 23/06/2023
$3000
Mombasa
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMVwdDySrP1Tv1QktknuZ4CQX9bIInxM4zHbZsfD6s_SCPRpQXWmW97TKLtoKrGa9FNzb2YNnPXrbQuW4nYO0IOb7RIridfhwV88iosy3aQs6uBPw_MBVOzovNGgWh_anji0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMP42hwpSJ1pP502mujllohDc1AJCtTFT8ET5yFhAEZHNtIAjMjaxGS7O_Z29k0HGWsmjWxRZMEgsb_GBecMk75a-AKr7025ffOsixzxepEQtePUcgGvleab4I9iHJumiSe0>
Online
Class
<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KM-cgdd93er8oiDD9RVWshifksuQNYSx-7xJgiwINncBeslDhS1VB-wJekZAJLb9HUKTuQwVF8tTYnomj_udU8aITYOVTfgl_THBKItiF49Ltk1>
Contact
us
<https://133IK.trk.elasticemail.com/tracking/click?d=TdO1gCuQ71hpWL60BWNntuwf2IWJfk_kJQ_Oex5_ejgzraWhWpdtWgRu_Blx4JbkmHiuQVyPuumZBZ7hlOX5L-FF4rWfsqN2KwqwJ42ASFA3awBwJXY_3zV0QX7C_GtxIK2k0-bxhjhkC5Zrui633GE1>
Whatapp
INTRODUCTION
Computer and Mobile Forensics teaches you how to identify,
preserve, extract, analyze and report forensic evidence on computers and mobile
devices. You will learn about the challenges of computer and mobile forensics,
walk through the process of analysis and examination of operating systems and
mobile devices, and gain a deep understanding of differences in evidence
locations and examination techniques on Windows and Linux computers and Android,
iOS and Windows phones.The course provides trainees with a practical based
understanding of the methodologies, tools and techniques used in computer
forensic and investigation in digital environment. The course content covers
acquisition, collection, seizure and preservation of evidence handling,
interpretation and final reporting and presentation of
findings.
COURSE
OBJECTIVES
After
competing this course, you will be able to:
Understand the fundamentals of digital forensics and explain the
need for mobile device forensics
Understand the threats associated with mobile
devices
Classify evidence types on mobile devices and evidence
acquisition types
Explain different mobile hardware
architecture
Develop a mobile forensics investigation
process
Use
various forensic tools for investigation
Investigate mobile security breaches and identify the
criminal
Restore the data and generate reports for future threats/attacks
analysis
Gathering volatile and non-volatile data from Windows and
recouping erased documents from Windows, Mac OS X, and Linux. Researching
password secured documents by utilizing password cracking concepts and
tools
Roles of the first responder, first responder toolkit, securing
and assessing electronic crime scene, directing preliminary interviews,
archiving electronic crime scene, gathering and safeguarding electronic proof,
bundling and transporting electronic crime scene, and detailing electronic
crime scene.
Setting up the computer forensics lab and creating investigation
reports.
Steganography, Steganalysis and image
forensics.
Kinds of log capturing, log management, Investigation logs,
network traffic, wireless attacks, and web assaults.
DURATION
10
Days
WHO
SHOULD ATTEND
This
training course is suitable to a wide range of professionals but will greatly
benefit:
Information Security
Professionals, Cyber Security officers, Security Officers,Computer Forensic
Analyst, Forensic and Network Investigators , Law Enforcement Officials,Ethical Hacking
Expert, Digital Forensics Investigators, Risk Assessments Professionals, Mobile
Developers, anyone who deals with implementation, testing, security hardening of
mobile devices.
COURSE CONTENT
Module
1
Course introduction
Computer forensics and investigation as a
profession
Define computer forensics
Describe how to prepare for computer investigations and explain
the difference between law enforcement agency and corporate
investigations
Explain the importance of maintaining professional
conduct
Digital evidence — legal issues
Identifying digital evidence
Evidence admissibility
Rules of evidence
What is seizure?
Consent issues
Expert witness
Roles and responsibilities
Ethics
Investigations
Investigative process
Incident response
E-discovery
Criminal vs. civil vs. administrative
investigations
Intellectual property
Reporting
Quality control
Evidence management
Current computer forensics tools and
hardware
Module
2
Forensic science fundamentals
Principles and methods
Forensic analysis process
Hardware
Storage media
Operating system
File systems
Erased vs. deleted
Live forensics
Module
3
File and operating system forensics
Keyword searching
Metadata
Timeline analysis
Hash analysis
File signatures
Volume Shadow Copies
Time zone issues
Link files
Print spool
Deleted files
File slack
Damaged media
Registry forensics
Multimedia files
Compound files
Web and application forensics
Common web attack vectors
Browser artifacts
Email investigations
Messaging forensics
Database forensics
Software forensics
Malware analysis
Module
4
Network forensics
TCP/IP
Types of attacks
Wired vs. wireless
Network devices forensics
Packet analysis
OS utilities
Network monitoring tools
Anti-forensics
Hiding
Steganography
Packing
Hidden devices (NAS)
Tunneling/Onion routing
Destruction
Spoofing
Log tampering
Live operating systems
Module
5
New & emerging technology
Legal issues (privacy, obtaining
warrants)
Social networks forensics
Types of social networks
Types of evidence
Collecting data
Virtualization
Virtualization forensics
Use of virtualization in forensics
Cloud forensics
Types of cloud services
Challenges of cloud forensics
Big data
Control systems and IOT
Mobile forensics introduction
Types of devices
GPS
Cell phones
Tablets
Vendor and carrier identification
Obtaining information from cellular
provider
GSM vs. CDMA
Common tools and methodology
Module
6
Mobile forensics process
Mobile forensics challenges
Types of evidence found on mobile
devices
Collecting mobile devices at the
scene
Comparison of mobile operating
systems
Data acquisition methods
Reporting findings
Android forensics
Android platform
Android security model
Bypassing Android security features
Android logical data acquisition and
analysis
Android physical data
acquisition
Module
7
iOS forensics
Apple iOS platform
iOS security
Bypassing iOS security features
iOS data acquisition and analysis
iPhone/iCloud backups
iOS data recovery techniques
Windows phones
Windows Phone OS: partitions and
filesystems
Windows Phone security features
Windows Phone logical acquisition and
analysis
Windows 10 mobile OS forensics
Feature phones forensics
Acquiring and examining data from feature
phones
NB:
This a full practical oriented training. Participants are required to have
laptops.
THE
END
<https://133IK.trk.elasticemail.com/tracking/unsubscribe?d=xy-Aaf_aktnKffaquKOfHLRr8Vzx-IN_Ax75jt-uJSYRagNIMIi5h--NTU7pIsf9HXDZg_ycIQHWnQVSJ9sWS0J-IxR1pEZXa0cRp4FFWNb8LMyYP4uhxTSVskvS9qgXfw2>
UNSUBSCRIBE
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.reproducible-builds.org/pipermail/rb-commits/attachments/20230131/9198a543/attachment.htm>
More information about the rb-commits
mailing list