HRTrainingCenter.com provides Human Resource training on FMLA, COBRA, HIPAA, HRAs (Health Reimbursement Accounts), HSAs (Health Savings Accounts), FLSA, Payroll, Cafeteria Plans, and more through seminars, online training, webcasts, webinars, and audio conferences. Best sellers include FMLA seminars, COBRA seminars, online payroll training, retirement plan training, and HIPAA training.
Course/Product Description
Title:

Computer Forensics And Electronic Discovery

SKU:OT-1003615
Format: Online Training Course
Order:Qty:
Description:

The Computer Forensic and Electronic Discovery course is designed to train cyber crime investigators to furnish irrefutable burden of proof from a digital artifact.

In taking this course you will learn electronic discovery, advanced investigation techniques, seizure concepts, forensic examination and much more. This course will prepare you for the CDFE certification provided by Mile2.

Benefits

  • Electronic discovery and advanced investigation techniques
  • Essential to encountering digital evidence while conducting an investigation
  • Recognize, seize, preserve and present digital evidence
Session 1
  • Section A: Course Overview
    • Introduction
    • Disclaimers and Prerequisites
    • Using the Student Guide
    • Computer Forensics Defined
    • Digital Evidence
    • E-Discovery Process
    • CDFE Course Objectives
  • Section B: Digital Forensics Incidents
    • Digital Incidents Overview
    • Charles Lund
    • Cybercrime.gov Web Site
    • Latest Press Releases
    • Computer Crime Cases
    • Legal Resources and Legislation
    • Computer Fraud and Abuse Act
    • Robert Morris
  • Section C: Type of Investigations
    • Criminal Incidents
    • Council of Europe on Cybercrime
    • Dealing with Foreign Countries
    • Civil Incidents
    • Types of Criminal Incidents
    • Computer Fraud
    • CFO Takeover Case
    • Investigating Fraud
    • Items to Investigate
  • Section D: Internal and External Threats
    • Internal Threats
    • Internal Threat Example
    • External Threats Defined
    • External Threat Types
    • Investigative Challenges
    • Media Volume
    • Using Forensics Tools
    • Attorneys vs. Investigators
  • Section E: Understanding the Assessment
    • Digital Incident Responses
    • Digital Incident Assessment
    • Assessment Considerations
    • Incident Types
    • Parties Involved
    • Confidential Informants
    • Operational Security
  • Section F: Assessment Equipment Needs
    • Incident/Equipment Location
    • Available Response Resources
    • Securing Digital Evidence
    • Proof of Secure Evidence
    • Chain of Custody
    • Incident Response Seizure Form
    • Chain of Custody Form
    • Evidence Placement
    • Kinds of Digital Evidence
  • Section G: File Storage Concepts
    • File Storage Overview
    • -Based Operating Systems
    • Understanding FAT and NTFS
    • Storage Concepts
    • Directories Defined
    • File Saving Process
    • File Structure
    • Stream Explorer Demo
  • Section H: Disk Storage Concepts
    • Understanding Disk Storage
    • Disk Read/Write Process
    • Hard Disk Breakdown
    • Master Boot Record
    • Slack Space
    • File Management
    • Word Size
    • Memory
    • Understanding File Formats
    • Quick View Plus
Session 2
  • Section A: Acquisition and Authentication
    • Digital Acquisition Overview
    • Digital Acquisition
    • Copying vs. Duplicating
    • Authentication
    • Generic Hash Demo
    • Text to Hex Demo
    • Creating a Hash
    • View MD5 Hash Result
    • Hash Extraction Reasons
    • eXpress CheckSum Calculator
  • Section B: Acquisition Procedures/Analysis Tools
    • Acquisition Procedures
    • On-Scene Acquisitions
    • ICS DriveLocks
    • RoadMASSter and ImageMASSter
    • Logicube and Paraben Duplicators
    • Laboratory Acquisitions
    • After Documentation
    • Logical Review
    • Acquisition Options
  • Section C: Duplication Demo
    • Innovision USB Write Blocker
    • Write-Protecting a Device
    • Cloning Disks with WinHex
    • FTK Imager
    • Specify Evidence Information
    • Image Destination Considerations
    • Creating the Image
    • dd.exe Overview
    • Creating a dd.exe Image
    • FTK Imager Results
    • WinHex Physical Hash
    • View dd.exe Image Results
    • Compare FTK and WinHex Physical Hashes
  • Section D: Investigation Analysis and Disk Cleaning
    • DC3 Operations
    • Analysis Phase
    • Disk Redactor and Disk Wipe
    • Cleaned Drive and Other Tools
    • FTK Overview
    • Case Log Options/Processes to Perform
    • Refining and Adding Evidence
    • Indexing Items
    • Alert Files and Bad Extensions
    • Encrypted, OLE, and Ignorable Files
    • Tab
    • Graphics and E-Mail Tabs
    • Search Tab
    • Bookmark Tab and Summary

  • Section E: Assessment Rules

    • Assessment Overview
    • Forensic Science
    • Digital Forensics
    • Scientific Method
    • Cardinal Rules
    • The ALPHA 5 System
    • Examinations
    • ALPHA 5 Steps
  • Section F: Assessment Details
    • Assessment
    • Acquisition
    • Authentication
    • Analysis and Reporting
    • Archive
    • The 20 Basic Steps
    • Steps 2 and 3
    • Steps 4 - 6
    • Steps 7 and 8
    • Boot Record Data with WinHex
    • Steps 9 - 14
    • Manual and FTK Data Carving
    • Steps 15 - 17
    • Steps 18 – 20
  • Section G: Digital Evidence Protocols
    • Digital Evidence Overview
    • Digital Evidence Concepts
    • Levels of Proof
    • Court Example
    • Types of Data
    • Ntuser.dat Analysis
    • Residual Data - Free Space
    • Free Space
    • Residual Data - File Slack
    • File Slack - Partial Artifacts
    • File Slack - Results
    • Residual Data - RAM Slack
  • Section H: Digital Evidence Protocols Continued
    • Swap Files
    • PageFile.sys
    • PageFile.sys Results and Searches
    • Residual Data - Temp Files
    • Residual Data - Unallocated Space
    • Electronic Mail
    • Background Data
    • Metadata
    • Viewing Photo Exifdata
    • Viewing File Metadata
    • Admissibility
    • Digital Evidence Summary
Session 3
  • Section A: The Role of Evidence
    • Lesson Objectives
    • Evidence
    • Types of Evidence
    • Electronic Files
    • Documentation Process
    • Writings or Recordings
    • Best Evidence Rule
  • Section B: Authenticity and Alteration
    • Authenticity and Alteration Decoded
    • Layman's Analogies
    • Forensic Report Template
    • Filling Out the Report
    • Common Assaults
  • Section C: Theoretical Background
    • Forensic Theory Overview
    • Locard's Exchange Principle
    • Recovery
    • Classification
    • Reconstruction
    • Temporal Aspects
    • TimeStomp
    • Using TimeStomp
  • Section D: Tracking Down the Suspect
    • Behavioral Evidence Analysis
    • Equivocal Forensic Analysis
    • Isiscan.com
    • Stages of Digital Evidence Examination
    • Victimology
    • Cybertrails
    • eMailTrackerPro
    • CentralOps.net
    • Questions on Cybertrails
    • Incident Scene Characteristics
  • Section E: Laboratory Validation
    • QA Objectives
    • Protocols
    • Quality Assurance
    • Standard Operating Procedures
    • Reports
  • Section F: Examination Review
    • Peer Review
    • Peer Review Details
    • Consistency
    • Accuracy
    • Research
    • Validation
    • Relevance
    • Liability and Legal Considerations
    • Peer Review Wrap-up
    • Annual Review
  • Section G: Deviation Policies and Lab Intake
    • Deviation
    • Deviation Guidelines
    • Deviation Consultation
    • Lab Intake
    • Tracking
  • Section H: Archiving Evidence and Legal Discovery
    • Storage
    • Discovery
    • Proficiency Results
    • Procedure Importance
Session 4
  • Section A: Duplication Part I
    • Lesson Objectives
    • Read-Only Technology
    • Duplication
    • RAID Reconstructor
    • UFS Explorer and Win Hex
    • Duplication Process
    • Duplication Tools
    • Hashing and Duplicating a Drive Review
    • Generic Hash Demo
    • Text to Hex Demo
    • Creating a Hash
  • B: Duplication Part II
    • View MD5 Hash Result
    • Hash Extraction Reasons
    • eXpress CheckSum Calculator
    • ICS DriveLocks
    • RoadMASSter and ImageMASSter
    • Logicube and Paraben Duplicators
    • Innovision USB Write Blocker
    • Write-Protecting a Device
    • Cloning Disks with WinHex
    • FTK Imager
    • Specify Evidence Information

  • Section C: Duplication Part III

    • Image Destination Considerations
    • Creating the Image
    • dd.exe Overview
    • Creating a dd.exe Image
    • FTK Imager Results
    • WinHex Physical Hash
    • View dd.exe Image Results
    • Compare Physical Hashes
  • Section D: The Examination
    • Examination Preparation
    • Recording the Logical Drive Structure
    • Logical Drive Structure
    • Logical Review Process
    • National Software Reference Library
    • File Extensions
  • Section E: Searches, Keywords, and Reports
    • Searches
    • Logical Review
    • Live Search
    • Search Results
    • Internet Keyword Search
    • and Importing
    • Import Results
    • View Reports and Log Files
    • FTK Log
  • Section F: Data Carving, Headers, and Reports
    • Data Carving
    • Hex Workshop
    • Hex Workshop Changes
    • Encoded Files
    • Reports
    • Redacted Reports
    • Redacted Report Findings
    • Redacted Time Zone Report
    • Module Wrap-up
  • Section G: eDiscovery
    • eDiscovery Overview
    • ESI
    • eDiscovery Notification
    • Data Retention
    • eDiscovery Liaison
    • Forms of eDiscovery
    • Metadata
    • Data Retention Architecture
    • Safe Harbor
    • Spoliation
    • Tools for eDiscovery
    • Guidance Software eDiscovery Suite
    • eDiscovery Importance
  • Section H: Cryptography
    • Cryptography Overview
    • Cryptography Background
    • Steganography
    • BlindSide
    • JPHS
    • Stego Suite
    • Encryption and Decryption
    • CrypTool Encryption
    • CrypTool Decryption
    • Concepts
Session 5
  • Section A: Passwords and Password Attacks
    • Passwords
    • Password Cracking
    • Passware Kit
    • Passware
    • Cain and Abel Password Cracking
    • Brute Force Attack
    • Rainbow Attack
    • Rainbow Tables
    • Password Cracking Results
    • Cryptography to Password Cracking
  • Section B: Data Carving and Registry Overview
    • Lesson Objectives
    • Scientific Procedure
    • Preparation
    • File Date/Time Stamps
    • File Signatures
    • Data Carving
    • Thumbs.db Data Carving
    • Registry
    • Registry Overview
    • Registry Editor
    • AccessData Registry Viewer
  • Section C: ADS and User Files
    • Alternate Data Streams
    • ADS Demo in Notepad
    • Attaching an .exe File
    • Stream Explorer
    • Unique ID Numbers
    • Decode GUID
    • Historical Files Part I
    • NTUSER.DAT
    • Log Files
    • Event Viewer
    • Resplendent Registrar Tool
    • Windows Explorer, Vista
    • Windows Explorer, XP
  • Section D: File Options
    • Historical Files Part II
    • index.dat
    • IE and Mozilla History View
    • Link File Extractor
    • Recent Document History
    • Miscellaneous Folder
    • Cookie Viewer
    • Favorites
    • Registry History and Password Recovery
    • Recent Files
    • Hidden Files
  • Section E: Recycled Files and Rootkits
    • Deleted Files
    • Recycle Bin in XP
    • Recycle Bin in Vista
    • E-mail History
    • Outlook File Recovery
    • Webmail
    • AFX Windows Rootkit 2003
    • Rootkit Discovery

About The Provider: LearnKey, Inc., is a premier global provider of self-paced training solutions for corporate, education, government, and personal users.

LearnKey brings the classroom experience to you - where and when you need it.

For nearly two decades, our mission has been to create flexible expert learning solutions - solutions that work for everyone because they are not only easy to use, but they are extremely engaging and interactive.

Our long-term commitment to the learning industry combined with our record of customer satisfaction and years of experience are the reasons LearnKey is recognized as a reputable global company. At LearnKey, we provide expert learning solutions today for tomorrow's leaders.
Price: $655.00
More Info: Contact Us For More Information
Order:Qty:
Share This: Share on Facebook


Share on Twitter


Share on Google+


How To Properly Complete A Form I-9
How To Properly Complete A Form I-9

Workplace Investigations 101: The Basics For Conducting Workplace Investigations
Workplace Investigations 101: The Basics For Conducting Workplace Investigations

Certificate Program For HR Generalists
Certificate Program For HR Generalists

Employee Handbook Updates for 2017: How To Ensure Legal Compliance And Avoid Liability
Employee Handbook Updates for 2017: How To Ensure Legal Compliance And Avoid Liability

PTO Plan Or Traditional Vacation And Sick Time? The Pros and Cons Of A Paid-Time-Off Plan
PTO Plan Or Traditional Vacation And Sick Time? The Pros and Cons Of A Paid-Time-Off Plan

Pre-Employment Screening: Can I Ask That Question?
Pre-Employment Screening: Can I Ask That Question?

 Agile Basics For HR
Agile Basics For HR

Strategic HR Basics: A Practical Approach To Working More Strategically In HR
Strategic HR Basics: A Practical Approach To Working More Strategically In HR

Internal Investigations Certificate Program
Internal Investigations Certificate Program

Certificate Program In FMLA &ADA Compliance
Certificate Program In FMLA &ADA Compliance

Basics Of Affirmative Action Planning
Basics Of Affirmative Action Planning

How To Identify And Investigate Claims Of Bullying
How To Identify And Investigate Claims Of Bullying

How To Change The Perception Of The HR Department
How To Change The Perception Of The HR Department

The Essentials Of HR Law
The Essentials Of HR Law

FMLA Training &Certification Program
FMLA Training &Certification Program

ADA Training &Certification Program
ADA Training &Certification Program

Google+HRTrainingCenter.com. 5755 North Point Parkway, Suite 228 | Alpharetta, GA 30022 | 770-410-1219 | support@HRTrainingCenter.com
Copyright HRTrainingCenter.com 2016 | Web Site Development by OTAU
Facebook