(314) 504-0530 info@bac-mail.com

Cyber Forensics Series Part 4

  • CPE Credits: eight (8) for all four parts in the series
  • Prerequisites: None
  • Learning Level: Basic
  • Instructional Method: Group/Live
  • Field of Study: Specialized Knowledge and Applications
Course Revision Date: March 1, 2023

Back to Training Catalog >

Course Description
In Part 3 we continue the cyber forensic investigation process with an examination of the critical role that time plays in an investigation along with the presentation of forensic investigative smart practices.  These smart practices represent the recommended step-by-step processes, for cyber forensic investigators desiring to maximize the potential for a successful cyber forensics investigation/assessment.

Here in Part 4 we begin by examining the process of evidence acquisition and preparation of the acquired evidence (data) for examination.  Preserving evidence and documenting the steps ensuring that preservation and also examined here.  We will also review methodologies for finding the data that matches the search criteria associated with the scope of the investigation.

Audience
This course is intended for internal and external audit professionals, Controllers, Law Enforcement and InfoSec professionals, anyone interested in obtaining a better understanding of and a general introduction to, cyber forensics, extending to more technical concepts beyond the storage and retention of data, into the process of obtaining digital evidence from collected data.
Objectives
After completing this course, participants will be able to:

  • Explain the process of identification and acquisition of raw data as potential evidential data.
  • Identify and process the steps requires for data preparation and presentation for examination.
  • Describe the essential sequencing of steps in a professionally conducted and quality controlled cyber forensic investigation.
  • Analyze all of the data collected, information obtained via analysis and prepare an explanatory report for an appropriate audience (e.g., senior management, legal department, law enforcement, etc.).
  • Define the steps necessary to establish effective and well controlled evidence retention and curation procedures.
Course Outline

Please contact Al with a request for a detailed course outline…

albert@bac-mail.com

Need more information?

If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.

2 + 8 =

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

cybersecurity and infrastructure security angency

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.