DURATION: 5DAYS The Internet has made it easier to perpetrate crimes by providing criminals an avenue for launching attacks with relative anonymity. The increased complexity of the communication and networking infrastructure is making investigation of the cybercrimes difficult. Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence. LEARNING OUTCOMES
- This course will prepare you in the disciplines of forensics investigations, incident response, memory forensics, network forensics, mobile device forensics, and reverse-engineering malware.
- Conduct in-depth forensic analysis of Windows/Linux operating systems and media exploitation focusing on Windows 7, Windows 8/8.1, XP, and Windows Server 2008/2012
- Identify artifact and evidence locations that will answer key questions, including questions about program execution, file opening, external device usage, geo-location, file download, anti-forensics, and system usage
- Focus your capabilities on analysis instead of how to use a specific tool
- Extract key answers by utilizing proper analysis via a variety of free, open-source, and commercial tools.