Course Description
Course Duration: Five training days
Course Language : Arabic or English
Include:
Scientific Article with Tab
Workshops
Reception and farewell at the airport
Daily lunch
Café break
To register, please contact us at
info@caclo.co.uk
Course Objective
• Application of digital forensics methodology in an operational environment
• Develop a strategy to define the digital forensics response framework
• Conduct investigations into social media, malware and viruses
• Scene management of (digital crime, digital and archaeological evidence)
• Investigate mobile technologies and other media that may carry identifiable and archaeological material
• Apply techniques to extract images from artifact systems
Target Groups:
This course is designed for IT professionals, fraud investigators, auditors, CSIRTs and SOC analysts working in companies vulnerable to digital attacks.
It also benefits police, military, probation officers and other security personnel who handle electronic investigations.
Target Competencies:
• Incident response
• Understand digital forensics
• Conducting digital crime investigation
• Application of forensic science
Program Content
Digital Forensics ( Background and Legal Information):
• Introduction to Criminal Science
• Terms and definitions
• Digital crime series
• Background on digital crime
• Its history is a real-life case
• Digital Criminal Laws
• Digital criminal legislation
• Digital forensics standards
• Digital Forensics Basics
• Risks faced by organizations
Digital Forensics Response Framework:
• First Digital Criminal Responder Toolkit
• Scene from Digital Crime Management
• Secure Operations Center (SOC)
• CSIRT (Computer Security Incident Response Team)
• Roles and responsibilities
• Implementation of a framework
• Case Management
Collection and processing of digital evidence:
• Domain Name System (DNS)
• Extended security infrastructure
• Investigation of mobile technologies
• Acquisition of digital evidence and tools
• Dealing with digital evidence and tools
• Processing of digital guides and tools
• Case management protocols
• Wireless protocols
• Support technologies
• Reporting practices
Internal and external digital crime investigations:
• OSINT (Open Source Information Exchange)
• Its role in digital forensics investigations
• Definition of domestic crimes
• Definition of foreign crimes
• Child exploitation and investigations
• Malicious applications
• Ransomware
• Criminal control capabilities
• Digital forensics and terrorism