Call Now+234 803 304 5484, +234 906 000 2299

Send Message[email protected]

Location: Accra - Ghana

Start Date: 02 Apr, 2024

End Date: 05 Apr, 2024

WiFiFree WiFi available

$6,500

Event Details

Computer Forensics Techniques and Tools workshop offers to participants the skills and knowledge to identify an intruder's footprints and to properly gather the necessary evidence to prosecute in the court of law. It covers investigating intrusion on computers/ computing devices, applications, websites and networks.

 

CONTENT

Forensic Science

  • Computer Forensics Objective and Need
  • Cyber Crime
  • Web Applications and Webservers Attacks
  • Email Attacks
  • Network Attacks
  • Forensics on Mobile Devices
  • Cyber Crime Investigation
  • Reporting a Cyber Crime
  • Expert Witness

Regulations, Policies and Ethics

  • Searching and Seizing Computers with and without a Warrant
  • Laws and Acts against Email Crimes
  • Laws pertaining to Log Management
  • Pertaining to Mobile Forensics
  • General Ethics while Testifying

Digital Evidence

  • Introduction to Digital Evidence and types
  • Rules of Evidence
  • Electronic Evidence: Types and Collecting Potential Evidence
  • Electronic Crime and Digital Evidence Consideration by Crime Category
  • Computer Forensics Lab
  • Understanding Hard Disks
  • Disk Partitions and Boot Process
  • Understanding File Systems (Windows | Linux | Mac OS X)
  • File Carving
  • Image Files
  • Analyze Logs
  • Database Forensics
  • Email Headers and Analysis
  • Malware Analysis
  • Mobile Operating Systems

Procedures and Methodology

  • Investigating Computer Crime
  • Computer Forensics Investigation Methodology
  • Digital Evidence Examination Process
  • Encryption
  • First Responder
  • First Response Basics
  • Roles of First Responder
  • Data Acquisition and Duplication
  • Defeating Anti-Forensics Techniques
  • Log Management and Event Correlation
  • Network Forensics (IDSs)
  • Computer Forensics Reports and Investigative Report Writing

Digital Forensics

  • Recover Data (Deleted Files & Partitions)
  • Filesystem Analysis
  • Operating Systems Forensics (Windows | Linux | Mac)
  • Steganography and Image File Forensics
  • Steganalysis
  • Investigating and Analyzing Logs
  • Investigating Network Traffic
  • Web Attack Investigation
  • Investigating Email Crime and Violation
  • Mobile Forensic Process
  • Cloud Forensics
  • Malware Forensics
  • Tools/ Systems/ Programs
  • First Responder Toolkit
  • Windows Forensic Tools (Helix3 Pro, X-Ways Forensics, Windows Forensic Toolchest (WFT), Autopsy, The Sleuth Kit (TSK), etc.)
  • Data Acquisition Software Tools (UltraKit Forensic Falcon, etc.)
  • Tools to defeat Anti-Forensics
  • Steganography Tools
  • Database Forensics Tools
  • Password Cracking Tools
  • Network Forensics Tools

 

FOR WHOM:

CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

This course is available in the following locations:
Nigeria - $5500
Rwanda - $7500
UK - $8500
USA - $8500

Venue

SunLodge Hotel, Off Achimota - Circle Road behind the Shell Filling Station at No. 76, 4th Road (Saxel Estates) Tesano – Accra, Ghana.

Other Dates

Start Date End Date
05 Aug, 2024 09 Aug, 2024
Start Date End Date
02 Apr, 2024 05 Apr, 2024