Certified Forensics Specialist


Cyber forensics can be defined as the process of extracting information and data from computer storage media and guaranteeing its accuracy and reliability. The challenge of course is actually finding this data, collecting it, preserving it, and presenting it in a manner acceptable in a court of law.

Electronic evidence is fragile and can easily be modified. Additionally, cyber thieves, criminals, dishonest and even honest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media using a variety of freeware, shareware and commercially available utility programs.

A global dependency on technology combined with the expanding presence of the Internet as a key and strategic resource requires that corporate assets are well protected and safeguarded.

When those assets come under attack or misused Cyber Security Professionals will gather electronic evidence of such misuse and utilize that evidence to bring to justice those who misuse the technology. To accomplish this, we go beyond theory, terminology and test the pragmatics of audit, security, operations and management tasks. Certification ensures that certified professionals can keep their skills and knowledge current through periodic re-certifications and access to the latest, up-to-date information.

Course Content

  1. Computer Forensics Training with Open Source Tools
  2. Overview of Computer Crime
  3. Preparing Sterile Examination Media
  4. Acquisition, Collection and Seizure of Magnetic Media.
  5. Recovering deleted data from a Cell phone
  6. Digital Camera Computer Forensics
  7. PDA and Mobile Computer Forensics
  8. Documenting a "Chain of Custody"
  9. Understanding Microsoft Windows from a forensics point of view
  10. Working with NTFS
  11. Combing Partition table and Boot record
  12. Investigating The Master File Table (MFT)
  13. Linux/Unix Computer Forensics
  14. Investigating Data Streams
  15. File storage Dates and Times
  16. File Deletion/Recovery
  17. Recovering Internet Usage Data
  18. Recovering: Swap Files/Temporary Files/Cache Files
  19. Preservation and Safe handling of Original Media
  20. Making Bitstream copies of Original Media
  21. Common Data Hiding Techniques
  22. Examining CD-ROM media
  23. Carving out files "Hidden" in Unallocated disk space
  24. Word Document forensics and Password cracking
  25. Issues when presenting Data in Court
  26. The Marking, Storage and Transmittal of Evidence.
  27. Use tools such as Encase Forensic Edition, Logicube Forensic Dossier & CellDek Tek, Paraben, Forensic ToolKit (FTK) etc.









Request Call Back