Train you to investigate
Conduct Digital Forensic
During the training
You will learn and improve your technical skills to conduct digital forensic with multiple hands-0n labs.
You will have the opportunity to focus and get professional consultation from trainer based on the challenges you face in investigating cyber incident and collecting digital evidence.
Crime Scene Investigation
You will practice and sharpen your skills by applying it in a crime scene.
You will be able to understand and conduct digital forensic whenever there is a cyber incident happended in your infrastructure.
Master Digital Forensic
You will be able to master advanced techniques to perform investigation and digital forensic.
This comprehensive training covers the methodology of conducting a successful digital forensic investigation. You will learn how to determine the root cause of a hack attack, effective techniques and method for successful forensics investigations on both Windows and Linux platform, writing a report on the findings, as well as how to gather and analyze digital evidence legally admissible in court, all through the 4-day intensive hands-on training.
Besides, you will also be exposed to various tactics and techniques used for identifying and tracking the perpetrators footprints. By the end of the training, you will be equipped with the necessary skills to conduct a forensic investigation in a proper manner. The customize scenario on the last day allows you to experience a forensic situation that is applicable to the real world.
- Legal Issues
- File Systems
- Image Acquisition & Analysis
- Memory Acquisition and Analysis
- Data Recovery
- Log Analysis
- Mobile Forensics
- Malware Analysis
- Enable you to understand the process and able to conduct a proper digital forensic investigation
- Learn how to discover traces of illegal or illicit activities with forensics tools and manual techniques
- Learn how to gather and analyze digital evidence requested by prosecution
- Able to utilize the latest technology that are widely used by the digital forensic experts
- Understand how to recover and interpret data intentionally hidden by culprit
- Learn how to write an effective report based on the findings of the forensic investigation
Who should attend:
Digital forensic investigator, system administrator, network administrator, law enforcement officer, information security personnel and anyone who requires effective digital forensic investigation skills