Saturday, October 21, 2017

cyber-security-no-tape

Advanced Computer Forensic Investigation - Hands-On Training

Cybercrime is one of the fastest growing areas of crime.cyb-502

Law enforcement alone can’t be the end all in responding to a cybercrime incident.  Cybercrime incidents require a FAST response to avoid disaster.

If your organization experiences a cyber security breach, or suspects a cyber security breach, are you going to call law enforcement or third party cyber security consultants each time?

Is law enforcement or a third party cybercrime consultant also going to  provide security remediation, implementation, and ongoing network monitoring? 

IS YOUR COMPANY READY TO HANDLE THESE CHALLENGES?

Your Research and Development director quits and goes to work for your competitor.

Did he download valuable company secrets to an external USB Drive and take them with him?

Your Point-of-Sale servers were hacked.

Were your customer's credit cards and personal information stolen?

You discover malware on a company server and have no idea how it got there.

What does the malware do and what information did it take?

An employee is accused of conducting illegal activities on his work computer, but denies all wrong-doing.

You don’t know what to believe.  How can you be sure?  

The "Cybercrime Incident Response: Advanced Computer Forensic Investigation” course, developed by certified cybercrime forensic examiners from the International Fraternity of Cybercrime Investigators (IFCI) , will teach you the computer forensic investigation skills to garner knowledge of What, How, When, and Why the incident occurred so you can make an informed decision and respond in a manner that is best for your company. 

 

  • Learn step-by-step how to conduct a computer forensic investigation, hands-on, from start to finish. 

    Students will learn the IFCI proven methodology for handling computer forensic investigations from the initial notification of an incident, to evidence identification and forensic acquisition, to in-depth forensic analysis, and developing case reports and expert witness testimony; including how to handle network intrusion investigations, and malware identification and analysis.

This course aligns with the National Institutes of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE), and focuses on domains 3 and 4 of ISACA’s CyberSecurity Fundamentals Certificate exam objectives.

Course content includes:

  • 14  Hands-on labs - real world scenarios
  • Windows forensic artifacts, file signatures
  • Volatile memory analysis
  • Intrusion investigation
  • Internet activity and email analysis
  • Network data analysis,  ports, and TCP/IPifci logo final
  • International cyber-criminal profiling, 
  • Attack vectors
  • Dynamic malware analysis