عربي
Providing Quality and
Professional Training Since 1984

Our Training Courses

Back
REGISTER_NOW Add to my calendar SEND_COURSE_TO_FRIEND Print this Course

Crimes of Electronic Corruption

Date: 17 December 2018 - 21 December 2018
Course ID: ADDS150/2018
Duration: 5 Days
Fee US$ - VAT is not included: 3400 US$
Venue: Kuala Lumpur / Malaysia
Category: Information Technology (IT)

Introduction:

This course enables participants to engage with, and to investigate, both internal and external digital crimes and infractions. Applying robust processes and procedures which encompass the Digital Forensic acquisition of images, from media and artifacts to computers and mobile technologies. Aligned with tough proven processes to secure evidential materials, participants have the opportunity to apply best practices to assure associated evidential integrity and value is maintained intact.

From a background of “in-the-field” law enfacement, associated with the key concepts of legal practices, this course will provide hands-on pragmatic experiences, underpinned by the academic and legal structures which form the basis of Forensic Science.

Objectives:

By the end of the course, participants will be able to:

• Apply a Digital Forensics methodology in an operational environment

• Set a strategy for a Digital Forensics response framework

• Conduct investigations into social media, malware, viruses, and ransom ware

• Manage a Digital Scene-of-Crime and its Digital evidence and artifacts

• Investigate mobile technologies, and other media which may hold evidential materials and artifacts

Who should attend:

This course is designed for IT professionals, Fraud Investigators, Auditors, CSIRT and SOC Analysts, working in companies that are targets for cyber and digital attacks. It is also highly beneficial for police and military personnel, probation officers and other security personnel who deal with cyber investigations.

Daily Outlines:

Cyber Crimes and Digital forensics – background and legal practices

• Introduction to the science of Cyber Crimes and Digital forensics

• Terms and definitions

• Chain of digital crime

• The background of digital crime

• Case histories of real-life cases

• Digital forensics – law and legislation

• Standards of digital forensics and tracing

• Fundamentals of digital forensics

• The risks faced by organizations



Response framework to Cyber Crimes and Digital forensics

• The first responder digital forensics toolkit

• Scene of digital crime management

• The CSIRT (Computer Security Incident Response Team)

• Roles and responsibilities

• Implementing a framework

• Case management



Collecting and processing digital evidence

• Domain Name System (DNS)

• Extended security infrastructures

• Investigating mobile technologies

• Acquisition of digital evidence and artifacts

• Handling of digital evidence and artifacts

• Processing of digital evidence and artifacts

• Case management protocols

• Wireless protocols

• Supporting technologies

• Reporting practices



Investigations of internal and external digital crimes

• OSINT (Open Source Intelligence)

• Its place in the digital forensic investigation

• Defining internal crimes

• Defining external crimes

• Malicious applications

• Ransomware

• Anti-forensics capabilities

• Digital forensics and terrorism

Back
REGISTER_NOW Add to my calendar SEND_COURSE_TO_FRIEND Print this Course