Real-world experience for one of the fastest-growing careers in technology. Learn how to find evidence on computers, phones, and even cameras. See the dark side of computer crime, get a free forensics kit and leave certified
Computer crimes happen! Did you know that evidence can be found on freshly formatted hard drives, cell phones, and even digital cameras?
The rate of fraud, abuse and downright criminal activity on IT systems by hackers, contractors and even employees are reaching alarming rates. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics duties on their jobs. In terms of job growth, nothing beats computer forensics as a career, and no one can beat InfoSec Institute as the best place to learn from a computer forensics training expert.
Computer crime is here to stay. Computer Forensics Specialists are needed by today's companies to determine the root cause of a hacker attack, collect evidence legally admissible in court, and protect corporate assets and reputation. The best way to become a forensics expert is to attend a training session with a computer forensics training expert.
During InfoSec Institute's Computer Forensics Training course you will:
You will also learn how to create an effective computer crime policy, and gain the hands on skills to implement it.
After attending Computer Forensics Training, you will leave with a custom computer forensics toolkit that will enable you to perform a legally admissible forensics investigation and the skills to run the investigation properly.
This hands-on computer forensics training offers practical experience in a wide array of computer forensics situations that are applicable to the real world. Learn everything relating to computer forensics --- from how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media.
Run hacking attacks in our classroom labs, be a hacker for a week:
Some of the hacking concepts you will learn to master during this hands on hacking course...
Our one-stop-shop boot camp will have you covered for the full five days. Here is what is covered in your course admission package:
|Dates||Location||Reserve a Seat!|
|Any Date!||Any Location!||Computer Forensics Online - More Details Here|
|-||Dulles, VA||Reserve a Seat|
|-||Live Online,||Reserve a Seat|
|-||Las Vegas, NV||Reserve a Seat|
|03/15/15-03/19/15||Live Online,||Reserve a Seat|
|03/15/15-03/19/15||Dulles, VA||Reserve a Seat|
|03/30/15-04/03/15||San Diego, CA||Reserve a Seat|
|04/06/15-04/10/15||Colorado Springs, CO||Reserve a Seat|
|05/04/15-05/08/15||Dulles, VA||Reserve a Seat|
|05/04/15-05/08/15||Live Online,||Reserve a Seat|
|06/01/15-06/05/15||Las Vegas, NV||Reserve a Seat|
|07/06/15-07/10/15||Dulles, VA||Reserve a Seat|
|07/06/15-07/10/15||Live Online,||Reserve a Seat|
|08/31/15-09/04/15||Dulles, VA||Reserve a Seat|
|08/31/15-09/04/15||Live Online,||Reserve a Seat|
|09/28/15-10/02/15||Colorado Springs, CO||Reserve a Seat|
|10/05/15-10/09/15||San Diego, CA||Reserve a Seat|
|11/09/15-11/13/15||Dulles, VA||Reserve a Seat|
|11/09/15-11/13/15||Live Online,||Reserve a Seat|
|Any Date|| Your Office!
||Get Information for On-Site Training|
This Computer Forensics training course prepares you for 2 industry recognized computer forensics certifications. As a vendor neutral training provider, InfoSec Institute has recognized that many students require more than one computer forensics certification. The training class will prepare you to take:
InfoSec's Computer Forensics Enterprise Suite, includes every program covered in the course .We have this Tool Suite available for individual purchase for $1,499!
Many course package options include a full license to Paraben P2 Commander - ask your account representative as other packages may be available.
Guaranteed small class size, you get an intimate learning setting not offered at any of our computer forensics competitors.
5 Full Days of Boot camp style training --- our instructors teach from 8am to 10:30pm every day. Course runs from 8am to 5pm daily with optional ethical capture the flag hacking exercises to 10:30pm.
All meals, snacks and refreshments included. Snacks not included in Las Vegas courses.
CCFE computer forensics certification fees included, CHFI exam vouchers available - please ask your account rep for details.
Total Access to our Computer Forensics Training Course Online:
The class is structured for maximum retention of knowledge learned in class. Because we believe in a commitment to your ongoing education after you attend a hands-on Forensics boot camp, we will make the online version of this class available to you for 30-days for continued self-paced learning, refresh, clarification. Ask your account rep for access after you have completed the course.
Be sure to check out our R&D site. We post tutorials, labs, white papers and articles to help you in your continued education. There are frequently forensics videos available. If you haven't taken a course with us yet, check out some of the types of thigns you'll be doing and learning about in class.
Lets pick up where we left off with the rootkit and post-exploitation video (http://www.youtube.com/watch?v=izv1b-BTQFw). Except, we are now doing incident response. First you’ll see some normal live forensics on the victim and come up with nothing. Then we show how using network forensics techniques (looking at the victim from the [...]
The post Incident Response and Computer Forensics on Rootkits appeared first on InfoSec Institute.
This analysis comes in handy in computer forensics cases such as porn or child pornography investigations. This video shows how to search through hundreds of thousands of images on a hard drive and find only those with human flesh tones in them. We also look at Slack/Free Space and OLE [...]
The post Flesh Tone Analysis – Intermediate Computer Forensics appeared first on InfoSec Institute.
Alternate Data Streams are a way to store data on a machine that is not readily accessible to users. Using ADS, files are not easily accessible by Windows operating system and they do not show up in any file directory. Windows generates it’s own ADS files and most P2P software [...]
Sometimes the best evidence of a network intrusion resides in network or traffic logs. Snort is a well known open-source traffic analysis and network intrusion detection tool. However, using the logs from Snort we can also see how the intrusion happened, rather than just that an intrusion happened. We’ll use Snort [...]