Forensics Training: All Listings 

Results 1 - 20 of 20 This Category · All Listings
Filter listings...
Commercial
Pricing Model

The Certified Digital Forensics Examiner program is designed to train Cyber Crime Investigators. Students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while con ...

Modified

This course will put you through the paces in Linux as it stands itself (the operating system), and then move you into Linux and Data Forensics. The idea here is to take someone new to Linux and get them up and running with enough knowledge and hands on e ...

ModifiedNever

This course is geared towards those with significant Linux knowledge, experience, and understanding. If you are a strong Linux power user and you know and understand at least the very basics of Linux forensics (I.E., have used 'dd' to create images, 'grep ...

ModifiedNever
New Technologies Inc

The course is ideal for individuals who conduct computer security reviews, computer based internal audits and computer related investigations. The participants in this course typically are employed by government agencies, law enforcement agencies, Fortune ...

ModifiedNever
New Technologies Inc

This course provides the participants with "hands-on" experience in developing and presenting computer evidence testimony in a courtroom setting. It relies upon the sanitized facts and evidence in an actual civil litigation case which involved the theft o ...

ModifiedNever
Risk Analysis Consultants

RAC Information Security Training Centre offers a standard set of computer forensic training courses. We offer, as an extension to our standard set of training courses, "Hot-spot workshops" based on your relevant problems. These workshops are oriented to ...

ModifiedNever
SP Hailey Enterprises

Computer Forensics Core Competencies 5day This computer forensics training is meant for those without any previous experience with computer forensics. The student will be introduced to concepts and techniques that every computer forensics practitioner mu ...

ModifiedNever
Key Computer Service, Inc.

The program is designed to be about 70% hands-on and will give you plenty of time to practice and learn the skills necessary to conduct forensic examinations. There are a maximum of 9 students per instructor, so there will be plenty of individual instruct ...

ModifiedNever
Commercial
Pricing Model

The Enterprise Intrusion Analysis course provides students with the skills needed to discover and analyze enterprise intrusions in a UNIX environment. Upon completion of this course, students should be able to: * 1. Detect an enterprise system i ...

Modified
Commercial
Pricing Model

This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...

Modified
Commercial
Pricing Model

The processes and methodologies taught in this class will train you to collect an image on damaged evidence where standard forensic imaging would have failed. You will learn to understand what kinds of problems hard drives have and what your options are t ...

Modified
Commercial
Pricing Model

Computer-based evidence is widely accepted in courts of law and is increasingly a mainstay of success--even where the crime or dispute in question is not "high-tech." SANS has worked hard to train forensic analysts and investigators to acquire, process, a ...

Modified
Intense School
Commercial
Pricing Model

The Certified Computer Examiner (CCE) certification is a challenging test of the knowledge required to work in computer forensics, involving an on-line proctored exam and a thorough practical component involving correct investigation of several physical i ...

ModifiedNever
Commercial
Pricing Model

What Will You Learn? This course will give you an in-depth study of the computer forensics process. Starting from creating evidentiary disk images to recognizing the often-faint trail of unauthorized activity, Foundstone updates this class continuously by ...

Modified
Commercial
Pricing Model

3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...

Modified
CFIP Certified Forensic Investigation Practitioner
Security University
Commercial
Pricing Model

Finally, a  Forensics class that teaches hands-on Tactical Forensics skills with validating  practical labs. This class is for students who want a comprehensive understanding of Forensic Examination and not just concepts of investigations. ...

Modified
James Madison University

The Digital Forensics concentration combines core computer science concepts with an in-depth, technical study of digital forensics. The curriculum is highly system-oriented, where students gain deep insights into how operating systems, networks, and compu ...

Modified
Commercial
Pricing Model

FOR572: Advanced Network Forensics and Analysis, was built from the ground up to cover the most critical skills needed to mount efficient and effective post-incident response investigations. It focuses on the knowledge necessary to expand the forensic min ...

Modified

This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that ...

Modified

© Computer Network Defence Limited 2021