(314) 504-0530 info@bac-mail.com

Cyber Forensics Series Part 3

  • CPE Credits: eight (8) for all four parts in the series
  • Prerequisites: None
  • Learning Level: Basic
  • Instructional Method: Group/Live
  • Field of Study: Specialized Knowledge and Applications
Course Revision Date: March 1, 2023

Back to Training Catalog >

Course Description
In Part 2 of this series on the introduction to cyber forensics, we examined several topics which form the basis for our understanding of how data eventually become digital evidence, including a review of volume versus partition, cylinder, head, sector, and Logical Block Addressing, File Systems—FAT 12/16 and NTFS, the File Allocation Table (FAT), Master File Table (MFT) and took a quick look at several alternative filing systems.

In Part 3 we continue the cyber forensic investigation process with an examination of the critical role that time plays in an investigation along with the presentation of forensic investigative smart practices.  These smart practices represent the recommended step-by-step processes, for cyber forensic investigators desiring to maximize the potential for a successful cyber forensics investigation/assessment.

Audience
This course is intended for internal and external audit professionals, General Counsels, Law Enforcement and InfoSec professionals, anyone interested in obtaining a better understanding of and a general introduction to, cyber forensics, extending into more technical concepts beyond the storage and retention of data, into the process of obtaining digital evidence from collected data.
Objectives
After completing this course, participants will be able to:

  • Describe both the role and significance that time contributes, to cyber forensic investigations.
  • Explain the foundations of forensic time
  • Communicate the importance of time and date to the cyber forensic process
  • Analyze the process for determining correct date and time associated with forensic evidence under review
  • Comprehend the cyber forensic investigative process, enabling better management of ongoing and subsequent cyber forensic analyses.
Course Outline

Please contact Al with a request for a detailed course outline…

albert@bac-mail.com

Need more information?

If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.

12 + 1 =

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

cybersecurity and infrastructure security angency

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.