CODE: ITCS11
DURATION: 5 Days
CERTIFICATIONS: CPD
Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, participants will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches.
This course is available in the following formats:
Virtual
Classroom
Request this course in a different delivery format.
Course Outcomes
At the end of this course, you will possess the skills needed to:
Understand the fundamentals of computer forensics
Understand the computer forensic investigation process
Describe in detail different types of hard disks and file systems
Understand data acquisition and duplication
Counteract anti-forensic techniques
Leverage forensic skills in Windows, Linux, and Mac
Investigate web attacks
Understand dark web forensics
Deploy forensic techniques for databases, cloud, and networks
Investigate email crimes including malware
Perform forensics in mobile and IoT environments
At the end of this course, you’ll understand:
This course is suitable for professionals involved in securing and managing information systems, including Information Security Analysts, Administrators, and Officers, IA Security Officers, Information Security Managers and Specialists, Systems Security Engineers and Managers, IT Auditors, Risk, Threat, and Vulnerability Analysts, as well as System and Network Administrators and Engineers.
✓ Modern facilities
✓ Course materials and certificate
✓ Accredited international trainers
✓ Training materials and workbook
✓ Access to online resources
Enroll Here