0345 4506120

Certified Forensic Investigation Practitioner

This core-level technical course is designed for people looking to develop their computer forensics investigation skills, either for a career in digital investigations or as part of their current cyber role.

Gain an understanding of digital forensics analysis by learning about forensic principles, evidence continuity and methodology to employ when conducting a digital forensic investigation.

This five-day course will provide you with a practical base understanding of the legalities, best practice and methodologies used in the current digital forensic investigation environment. The course content covers seizure, evidence handling and data preservation, through to investigation and interpretation, and finally the reporting and presentation of findings.

WHO SHOULD ATTEND

Those responsible or eager to become responsible for computer forensic investigations, including:

  • Cyber Forensic & Network Investigators
  • IT Security Officers
  • Law Enforcement Officials

Learning Objectives

THE SKILLS YOU WILL LEARN

Using practical scenarios based on Windows 7 artefacts with the latest disk technologies, you will learn the following:

  • The principles and guidelines for static digital forensic investigations
  • The process of evidence continuity
  • The fundamentals of the complete forensic investigation process
  • The forensic acquisition of an electronic device
  • How data is stored on electronic media
  • How to work with key forensic investigation products
  • How to identify Windows based OS forensic artefacts
  • How and where is data actually stored on a device?
  • What is the difference between forensic imaging and cloning?
  • Is keyword searching an effective way to identify data on a device?
  • What is hashing and how can it be used in digital forensics?
  • What happens when a user deletes a file or empties a recycle bin?
  • How does ‘Private’ web-browsing work?
  • Can data be recovered after 7 pass overwrite?
  • Is there a backdoor to passwords and encryption?
  • Who was using a computer on a particular occasion?
  • How can I identify if and when a user edited or accessed a file?

KEY BENEFITS

The course will give you:

  • An understanding of each stage of a forensic investigation, from evidence seizure through to data investigation and interpretation, to report and presentation of findings
  • The skills to allow you to undertake the forensic acquisition of an electronic device
  • Confidence in working with key forensic investigation products
  • An industry-recognised qualification in forensic investigation and ideal preparation for the CFIS advanced course

Pre-Requisites

Experience with Microsoft Windows OS and, ideally, a general appreciation of forensic principles, practices and software.

Course Content

SYLLABUS

1. Introduction to Digital Forensics

2. Investigation Guidelines and Process

3. Identification & Seizure

4. Forensic Acquisition

5. Understanding Electronic Data

a. Understand how data is stored on electronic devices

b. Analyse the functionality of a computer file system

6. Physical and Logical Disks

7. File Systems and Data Storage

8. Dates, Times and Metadata

9. Forensic Analysis Techniques

10. Windows Artefacts

a. Function, structure and operation of the Windows registry

b. Internet history

c. Recycle bins

11. Forensic Challenges

12. Reporting

a. Collating results

b. Contents and layout of forensic reports

13. Electronic data

a. Hardware and Software

b. Addressing hardware employed during a forensic investigation

c. Familiarisation with forensic software

14. Investigating Windows artefacts

15. Reporting

Exams & Certification

ACCREDITATIONS SYLLABUS

CFIP has been assessed and accredited by IISP at Level 1 for A2 and A6 and Level 1+ for F2 and F3, enabling you to build knowledge, competency and gain hands-on experience in the areas of the Institute’s Skills Framework.

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Our Customers Include