Systems Forensics, Investigation and Response Training

Systems Forensics, Investigation and Response Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Systems Forensics, Investigation and Response Training Course with Hands-on Exercises

Examines the fundamentals of system forensics with this Systems Forensics, Investigation and Response Training

Computer crimes call for forensics specialists, people who know how to find and follow the evidence. This Systems Forensics, Investigation and Response Training course examines the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. In this course, you will learn about computer crimes, forensic methods,and laboratories and addresses the tools, techniques,and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field.

In addition to premium instructional content from Jones & Bartlett Learning’s comprehensive Information Systems Security and Assurance (ISSA) curriculum, this Systems Forensics, Investigation and Response Training course provides access to a customized “virtual sandbox” learning environment that aggregates an unparalleled spectrum of cybersecurity applications. Providing instant, unscheduled access to labs from the convenience of a web-browser, this course allows you to practice “white hat” hacking on a real IT infrastructure-these are not simulations.

This Systems Forensics, Investigation and Response Training course covers content within the following industry certification exam:

• Certified Information Systems Security Professional (CISSP) – two content domains covered

Related Courses

CISA Training | Certified Information Systems Auditor Training
CISM Training | Certified Information Security Manager Training
CISSP Training | Certified Information Systems Security Professional Training
CompTIA Cybersecurity Analyst+ Training | CSA+ Certification Training
CompTIA Security+ Certification Training
Computer Forensics Training
CyberSec First Responder: Threat Detection and Response Training
Cyber Threats Detection and Mitigation Training
Cybersecurity Investigations and Network Forensics Analysis
Ethical Hacking Training | CEH Certification Training
Fundamentals of Information Security Training
Hacker Tools, Techniques, Exploits, and Incident Handling Training
Network Penetration Testing and Ethical Hacking Training
Reverse Engineering Malware Training
Industrial Control Systems – ICS/SCADA Security Essentials Training
Systems Forensics, Investigation, and Response Training

Customize It:

• If you are familiar with some aspects of this Systems Forensics, Investigation and Response Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Systems Forensics, Investigation and Response Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Systems Forensics, Investigation and Response Training course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Systems Forensics, Investigation and Response Training course:

• Information security analysts
• Payroll specialists
• IT infrastructure security specialists
• People who decide which information technology and cybersecurity products to acquire for their organization

What You Will Learn:

Upon completing this Systems Forensics, Investigation and Response Training course, learners will be able to meet these objectives:

• The role of computer forensics in responding to crimes and solving business challenges
• System forensics issues, laws, and skills
• Purpose and structure of a digital forensics lab
• Evidence life cycle
• Procure evidence in physical and virtualized environments
• Impact of sequestration on the evidence-gathering process
• Collect evidence in network and email environments
• Automated digital forensic analysis
• Report investigative findings of potential evidentiary value
• Constraints on digital forensic investigations

Systems Forensics, Investigation and Response Training – Course Syllabus:

1. The System Forensics Landscape

• Introduction to Forensics
• Overview of Computer Crime
• Forensics Methods and Labs

2. Technical Overview: System Forensics Tools, Techniques, and Methods

• Collecting, Seizing, and Protecting Evidence
• Understanding Information-Hiding Techniques
• Recovering Data
• Email Forensics
• Windows Forensics
• Linux Forensics
• Mac Forensics
• Mobile Forensics
• Performing Network Analysis

3. Incident Response and Resources

• Incident and Intrusion Response
• Trends and Future Directions
• System Forensics Resources

Labs

Lab 1: Perform a Byte-Level Computer Audit
Lab 2: Apply the Daubert Standard on the Workstation Domain
Lab 3: Create a Forensic System Case File for Analyzing Forensic Evidence
Lab 4: Uncover New Digital Evidence Using Bootable Utilities
Lab 5: Automate Digital Evidence Discovery Using Paraben’s P2 Commander
Lab 6: Apply Steganography to Uncover Modifications to an Image File
Lab 7: Decode an FTP Protocol Session and Perform Forensic Analysis
Lab 8: Automate Image Evaluations and Identify Suspicious or Modified Files
Lab 9: Craft an Evidentiary Report for a Digital Forensics Case
Lab 10: Perform an Incident Response Investigation for a Suspicious Login

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email