(314) 504-0530 info@bac-mail.com

Cyber Forensics Series Part 2

  • CPE Credits: eight (8) for all four parts in the series
  • Prerequisites: None
  • Learning Level: Basic
  • Instructional Method: Group/Live
  • Field of Study: Specialized Knowledge and Applications
Course Revision Date: March 1, 2023

Back to Training Catalog >

Course Description
We started small, in fact very small . . . bits and bytes small, in Part 1, explaining the origins of data and progressing onward, addressing concepts related to data storage, boot records and partitions and how each of these are interrelated and essential in the understanding of the process and methodology of a cyber-forensic investigation.

Part 2 of this series on the introduction to cyber forensics, continues on with our examination of the progression of data onto actual digital evidence by providing a comprehensive examination and discussion of the science of cyber forensic investigations, what is happening behind the scenes to data and why, what to look for and where to find it.

While still focusing on an understandable presentation of often technical concepts, Part 2 examines further advanced topics of a cyber-forensic investigation, including; volume versus partition, cylinder, head, sector, and Logical Block Addressing, File Systems—FAT 12/16 and NTFS and the File Allocation Table (FAT).

Audience
This course is intended for internal and external audit professionals, General Counsels, Law Enforcement and InfoSec professionals, anyone interested in obtaining a better understanding of and a general introduction to, cyber forensics, extending into more technical concepts beyond the storage and retention of data, into the process of obtaining digital evidence from collected data.
Objectives
After completing this course, participants will be able to:

  • Communicate an understanding of volumes and partitions as they relate to investigating digital evidence.
  • Recognize the difference as well as the relationship between cylinder, head and sector, and role of Logical Block Addressing.
  • Differentiate between FAT 12/16 and NTFS file systems.
  • Explain how a cluster size is determined.
  • Validate the functionality, operation and relevance, to a cyber-forensic investigation, of the master file table.
  • Identify significant concepts related to alternative filing systems.
Course Outline

Please contact Al with a request for a detailed course outline…

albert@bac-mail.com

Need more information?

If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.

14 + 1 =

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

cybersecurity and infrastructure security angency

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.