CERTIFIED CYBER RESILIENCE AND FORENSIC INVESTIGATOR

The Certified Digital Forensics Examiner program is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation.

Benefits of this Course:

The CDFI course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence. An example of “corrective action” would be the termination of an employee for a violation of computer usage where digital evidence was needed to support the allegation. The investigator must furnish an irrefutable burden of proof based on that digital evidence.

a.Goals of Forensics Readiness
b.Forensics Readiness Planning
c.Disruptive Incidents to the Business
d.Cost Expenditure Responding to the Security Incident

a.Electronic Evidence
b.First Responder
c.Roles of First Responder
d.Electronic Devices: Types and Collecting Potential Evidence

a.UFED System
b.UFED Physical Pro
c.UFED Ruggedized

a.Key Steps in Forensics Investigation
b.Rules of Forensics Investigation
c.Need for Forensics Investigator
d.Collect the Evidence
e.Data Recovery Software

a.Accessing Computer Forensics Resources
b.Role of Digital Evidence

a.Searches Without a Warrant
b.Evaluate and Secure the Scene
c.Forensics Photography
d.Gather the Preliminary Information at the Scene
e.First Responder

a.Evidence Assessment
b.Case Assessment
c.Processing Location Assessment
d.Best Practices to Assess the Evidence

a.Expert Witness
b.testifying in the Court Room
c.Closing the Case
d.Maintaining Professional Conduct
e.Investigating a Company Policy Violation
f.Computer Forensics Service Providers
g.Collecting Evidence from RAM

a.Metadata
b.Types of Metadata
c.Metadata in Different File Systems
d.Metadata in PDF Files
e.Metadata in Word Documents
f.Tool: Metadata Analyzer

a.Deleting Files
b.What Happens When a File is Deleted in Windows?
c.Recycle Bin in Windows
d.Storage Locations of Recycle Bin in FAT and NTFS System
e.How the Recycle Bin Works
f.Damaged or Deleted INFO File
g.Damaged Files in Recycled Folder
h.Damaged Recycle Folder

a.Post-Seizure Issues
b.Searching Computers Already in Law Enforcement Custody
c.The Permissible Time Period for Examining Seized Computer

a. Computer Forensics Experts
b. Role of Computer Forensics Expert
c. Medical & Psychological Experts
d. Civil Litigation Experts
e. Construction & Architecture Experts
 f. Criminal Litigation Experts

a.FTK
b.Encase
c.BelkaSoft
d.DVR Examinar
e.Magnetic examine
f.Atola
g.MD vedio
h.VIP
i.UFED
j.XRY
k.Oxygen forensic
l.Elcomsoft
m.MD seris

a.Understanding Corporate Investigation
b.Legal Issues
c.Person Assigned to Report the Crime
d.Who to Contact at the Law Enforcement?

a.Duplicate the Data (Imaging)
b.Verify Image Integrity
c.MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
d.Recover Lost or Deleted Data
e.Data Recovery Software
f.Analyze the Data
g.Data Analysis
h.Data Analysis Tools

a.Documentation in Each Phase
b.Gather and Organize Information
c.Writing the Investigation Report
d.Sample Report

a.Message Digest Function: MD5
b.Why MD5 Calculation?
c.MD5 Hash Calculators: HashCalc,
d.MD5 Calculator and HashMyFiles
e.MD5 Checksum Verifier
f.ChaosMD5

a.Computer Security Logs
b.Computer Security Logs
c.Operating System Logs
d.Application Logs
e.Security Software Logs
f.Router Log Files
g.Honeypot Logs

a.Collect Physical Evidence
b.Evidence Collection Form
c.Collect Electronic Evidence
d.Guidelines for Acquiring Evidence

a.Evidence Management
b.Chain of Custody
c.Chain of Custody Form

Courses Duration: 2 Months

Who should attend

Things required for Online Training

Key Take Away