Main Menu
My Infosec
Main Menu
My Infosec

Data Recovery and Computer Forensics Training Boot Camp

This boot camp will help to prepare you for multiple certification exams in the exciting world of computer forensics and data recovery. Expertise in these fields is in high demand, due to the increase in cybercrime and the need for the recovery of data from damaged components. Learn more about this fascinating new career path today!

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted IT training vendors - 42 industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Live Online students.

Analysts Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

Computer Forensics and Data Recovery Boot Camp

InfoSec Institute’s Computer Forensics and Data Recovery course, delivered in the form of a 10 Day Boot Camp style course, is the industry’s most comprehensive computer forensics and data recovery course available.

You will learn everything there is to know about computer forensics and data recovery, , from the use of enterprise computer forensics tools to analyze trace evidence left behind by computer criminals, to the recovery of data from totally damaged and destroyed hard drives.

The goal of this course is to help you master the skills needed in computer forensics and data recovery. You will also be prepared to take up to 4 certifications (CCFE, CCE, CHFI, CDRP)!

Computer crimes happen! Did you know that evidence can be found on freshly formatted hard drives, cell phones, and even digital cameras?

The rate of fraud, abuse and downright criminal activity on IT systems by hackers, contractors and even employees are reaching alarming rates. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics duties on their jobs. In terms of job growth, nothing beats computer forensics as a career, and no one can beat InfoSec Institute as the best place to learn from a computer forensics training expert.

InfoSec Institute’s Data Recovery Training course is the most hands on and highly technical logical and physical data recovery course available anywhere. You will learn the fundamentals of hardware data recovery which will enable you to properly diagnose dead drives and bring them back to life. You will also learn logical recovery for Windows, Mac OS X, Linux, RAID arrays, Exchange server and even solid state flash NAND drives!

This class does not rely on you purchasing an expensive tool (such as the PC-3000).

Award-Winning Training

Training Program Details:

Computer crime is here to stay. Computer Forensics Specialists are needed by today’s companies to determine the root cause of a hacker attack, collect evidence legally admissible in court, and protect corporate assets and reputation. The best way to become a forensics expert is to attend a training session with a computer forensics training expert.

During InfoSec Institute’s Computer Forensics Training course you will:

  • See the dark side of how computer crimes are committed.
  • Learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques.
  • Learn how to recover data intentionally hidden or encrypted by perpetrators.

You will also learn how to create an effective computer crime policy, and gain the hands on skills to implement it.

After attending Computer Forensics Training, you will leave with a custom computer forensics toolkit that will enable you to perform a legally admissible forensics investigation and the skills to run the investigation properly. With InfoSec Institute’s Data Recovery training, you will gain the skills to propel yourself to being one of the top data recovery engineers on the market today.

This hands-on computer forensics training offers practical experience in a wide array of computer forensics situations that are applicable to the real world. Learn everything relating to computer forensics — from how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media.

Total Hands-On Lab Environment in Computer Forensics and Data RecoveryTraining:

  • Computer Forensics Training with open source tools
  • Overview of Computer Crime
  • Preparing sterile examination media
  • Acquisition, collection and seizure of magnetic media.
  • Recovering deleted data from a cell phone
  • Digital Camera Computer Forensics
  • PDA Computer Forensics
  • Documenting a “Chain of Custody”
  • Understanding Microsoft Windows from a forensics point of view
  • Working with NTFS
  • Combing Partition table and boot record
  • Investigating The Master File Table (MFT)
  • Linux/Unix computer forensics
  • Investigating data streams
  • File storage dates and times
  • File deletion/recovery
  • Recovering Internet Usage Data
  • Recovering: Swap Files/Temporary Files/Cache Files
  • Preservation and safe handling of original media
  • Making bitstream copies of original media
  • Common data hiding techniques
  • Examining CD-ROM media
  • Carving out files “hidden” in unallocated disk space
  • Word document forensics and password cracking
  • Issues when presenting data in court
  • The marking, storage and transmittal of evidence.
  • Use tools such as Encase Forensic Edition, X-Ways Forensic Addition, Forensic TookKit (FTK), Linux dd, etc.
  • Logical Recovery of disabled hard drives
  • Using file format recognition tools
  • Logical recovery via avoiding BIOS interrupts
  • Motions that unlock the actuator of a drive
  • Diagnosing the physical recovery of drives
  • Comparing pre-recorded sound samples to live drives
  • Logic board replacements
  • Single and Multi-Platter Swaps
  • Head Assembly replacement
  • P-List and G-List recovery
  • Addressing SMART values
  • Dealing with damaged sectors
  • Reverse scanning
  • Capturing SID protected folders
  • Resolving kernel or driver issues with a Linux bootable disk
  • Head Stack replacement
  • Working with the Service Area (SA) of a drive
  • Reviewing data structures with a Hex Editor
  • Diagnosing “clicking noises”
  • Mac OS X Data Recovery
  • Linux Data Recovery
  • RAID 0 Recovery & RAID 5 Recovery
  • Vista and Recovery of Shadow Copies
  • Clearing passwords on a password protected drive
  • Solid state drive recovery
  • Firmware issues

Required Prerequisites:

  • Firm understanding of the Windows Operating System
  • Attendees can be anyone involved in the security of information assets: information security officers and managers, network administrators, Windows administrators.
  • Desire for computer forensics training

Our Major Clients

Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
View instant course pricing