The Business Process & IT Best Practices Specialist!
Contact Us
+91 9810609560

Digital Forensics Tools & Techniques


Course Description:

A 3 day hands on course for the Law enforcement officers who deal with. Forensic investigations, which are a time-consuming effort that requires specialized expertise, procedures, tools, and real-world knowledge of excavating digital evidence. With the growth of emerging portable data and storage devices, such as portable digital assistants (PDAs), cell phones, and Blackberry devices, crucial information can be anywhere and easily passed from device-to-device. Information stored in these changing media can be crucial sources of evidence in corporate, civil, and criminal investigations.

Course Objectives:

A hands on program translates to much needed practical knowledge and skills related to Digital Forensics. 
The exercises covered in the course incorporate significant real-world experience necessary for delivering world -class results in the field.
Helps participants through detailed step-by-step and how-to instructions
Instructor-led and student-performed hands-on exercises
Real-world simulations of forensics challenges
Each participant will be Police  with the knowledge, tools, and processes required in producing computer evidence that can withstand legal scrutiny.

.

Course  Requirements

All delegates must complete 7S TP-101 or have permission from our course director before taking this course.

Course Topics:

Topics in this course include the following:

  • Requisite technology knowledge relevant to incidents investigations
  • Laws relating to computer crime investigations
  • Tried and proven forensics investigation processes
  • Getting an organization ready for forensics investigations
  • Forensics tools and techniques of the trade
  • Evidence acquisition and duplication
  • How-to analyze evidence for forensics artifacts
  • Performing forensics analysis of common operating systems
  • Internet forensics
  • Information recovery
  • Capturing volatile data from a live computer
  • Conducting memory analysis
  • Analyzing malware and conducting reverse engineering
  • Developing incidents reports

Completion Conditions:

A delegate is considered to have completed this course if he/she attends all three days, and satisfactorily completes the assigned exercises/tasks/tests. On completion each delegate is presented with a certificate of completion for 7 S TP 205.