Learn the science of Cryptography and how it plays a role in computer forensics.
This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK) and Password Recovery Toolkit (PRTK) to locate and examine e-mail messages, deleted files, free space and file slack.
|This 1 day course provides investigating agents with the knowledge and skills necessary to effectively use the Forensic Toolkit (FTK) to locate and examine email messages, graphics, chat files, documents, spreadsheets, web pages, deleted files and other critical pieces of evidence available from computer media involved in investigations. FTK functioning in Case Reviewer mode allows cases to be created in a matter which provides investigators the ability to analyze evidence without the ability to change the properties of existing cases. This functionality is very helpful for court ordered attorney examinations, and case review ability. Additionally, students will gain a basic understanding of computer forensics and have the opportunity to take part in a practical skills assessment of the course material. This beginner level, hands-on intensive training is intended for Law Enforcement Personnel, Investigators and Security and Network Administrators that are responsible for examining, analyzing, and classifying digital evidence. |
This course provides students with the knowledge and skills necessary to conduct an effective Internet application based investigation. Students should already be conducting computer based investigations and be familiar with the AccessData suite of tools. Internet based investigations experience would provide additional background knowledge but is not necessary. This is not an undercover investigations course, it is data recovery focused.
This advanced AccessData® training class provides the knowledge and skills necessary to recover and analyze forensic artifacts from the Macintosh operating system using Forensic Toolkit® (FTK®), FTK Imager, and Password Recovery Toolkit® (PRTK®). Participants will learn GPT drive structure and sound methodology for imaging Macintosh hard drives as well as how to obtain date and time information from Macintosh systems. In addition to working with the Macintosh operating system, participants will recover artifacts from Macintosh-associated programs such as Safari and Firefox browsers, iChat, and Apple Mail. Participants will also learn how to recover artifacts from iPod and iPhone devices.
|The course is designed for security administrators, security auditors, data center managers, IT managers, system administrators, and law enforcement investigators who are responsible for responding to and investigating network irregularities. It is designed to show the student how to collect and analyse network data from a single point of control using AccessData SilentRunner.|
This advanced one day course provides the knowledge and skills necessary to analyse the New Microsoft® Windows 8® operating system artifacts, user data and file system mechanics in Storage Spaces using the Forensic Toolkit (FTK), FTK Imager and Registry Viewer. During this one-day workshop, participants will review Windows 8 features, learn of artifact locations for Internet Explorer 10 and Immersive Application cache data, describe the new File History service and artifact processing. Students will also review Windows 8 artifacts such as Virtual Hard Disks, Storage Pools and updated NTFS structures finishing with an overview of core registry files and new values of forensic interest pertaining to user activity on a Windows 8 system.
This advanced AccessData training class provides the knowledge and skills necessary to analyse Microsoft Windows 7 operating system artifacts and file system mechanics using Forensic Toolkit (FTK), FTK Imager, Password Recovery Toolkit (PRTK) and Registry Viewer.
The Windows Forensics—Core Training follows up the AccessData® BootCamp training. This advanced AccessData training class provides the knowledge and skills necessary to use AccessData products to conduct forensic investigations on Microsoft® Windows® systems. Participants will learn where and how to locate Windows system artifacts using Forensic Toolkit® (FTK®), FTK Imager®, Registry Viewer® and Password Recovery Toolkit® (PRTK®).
|In the continually evolving Windows Forensics series, the Windows registry continues to be a major source of Windows related artifact and information storage. Having the proper knowledge of registry based artifacts can make or break an investigation.|
|This 3 day advanced AccessData workshop provides the knowledge and skills necessary to analyse Microsoft's Windows Vista operating system artifacts and file system mechanics using Forensic Toolkit (FTK), FTK Imager, Password Recovery Toolkit (PRTK), and Registry Viewer.|
This 3 day course provides students with the knowledge and skills necessary to conduct an effective Windows based investigation. Attendees should already be conducting computer based investigations and be familiar with the AccessData suite of tools.