Objectives:
• Understand the fundamentals of computer forensics and its role in investigating cybercrimes
• Learn various techniques and tools used in collecting, analyzing, and preserving digital evidence
• Gain practical experience in applying computer forensic methodologies to real-world scenarios
Course Content:Introduction to Computer Forensics
• Fundamentals of computer forensics
• Types of cybercrimes and investigation procedures
• Regulations and standards influencing computer forensics investigations
Digital Evidence Collection and Acquisition
• Data acquisition methodologies
• Imaging and hashing techniques
• Handling and preserving digital evidence
File System Analysis
• Understanding file systems in Windows, Linux, and Mac operating systems
• File system examination tools
• Data recovery techniques
Disk Forensics
• Characteristics of different disk drives
• RAID and NAS/SAN storage systems
• Encoding standards and file format analysis
Anti-Forensics and Countermeasures
• Common anti-forensics techniques used by attackers
• Methods to detect and mitigate anti-forensics
• Related tools and countermeasures
Operating System Forensics
• Volatile and non-volatile data acquisition in Windows
• Windows memory and registry analysis
• Windows file system forensics (ShellBags, LNK files, Jump Lists, event logs)
• Volatile and non-volatile data acquisition in Linux and Mac
• Memory forensics in Linux and Mac
Network Forensics
• Network forensics fundamentals
• Event correlation and Indicators of Compromise (IOCs)
• Network traffic investigation techniques and tools
• Wireless attack detection and investigation
Malware Forensics
• Static and dynamic malware analysis
• System and network behavior analysis
• Ransomware analysis
Web Application Forensics
• Web application threats and attacks
• Web application log analysis (IIS, Apache)
• Investigation of web application attacks
Specialized Forensics
• Tor browser forensics
• Cloud forensics (AWS, Microsoft Azure, Google Cloud)
• Email and social media forensics
• Mobile forensics (Android and iOS)
• IoT forensics
Whom can attend:
• Law enforcement personnel
• Cybersecurity professionals
• IT security analysts
• Digital forensics investigators
• Incident response team members
Methodology
The training methodology integrates lectures, interactive discussions, collaborative group exercises, and illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical experience, emphasizing the application of learned techniques. This approach ensures that attendees return to their professional environments equipped with both the competence and self-assurance to effectively implement the acquired skills in their responsibilities
.
DATE:
1ST BATCH: 14th – 17th Jan,2025
2ND BATCH: 9th – 11th June,2025
25, Queen street, Alagomeji Bus Stop, Yaba, Lagos