Digital devices are everywhere in today’s world, helping people communicate locally and globally with ease. Most people immediately think of computers, cell phones and the Internet as the only sources of digital evidence, but any piece of technology that processes information can be used in a criminal way. Computers are used for committing crime, and, thanks to the burgeoning science of digital evidence forensics, law enforcement now uses computers to fight crime.
Major shifts in the information technology landscape over the past two decades have made the collection and analysis of digital evidence an increasingly important tool for solving crimes and preparing court cases. While digital evidence exploitation is a relatively new tool for law enforcement investigations, law enforcement relies extensively on digital evidence for important information about both victim and suspects. Doe to the potential quantity of digital evidence available, cases where such evidence is lacking are more difficult to develop leads and solve.
Law enforcement agencies are challenged by the need to train officers to collect digital evidence and keep up with the rapidly evolving technologies like computer operating systems. As computer crimes increase and continue to overwhelm crime laboratories, managers need a quick and assured way to validate an examiner’s experience and their equipment calibration.
This course will prepare the delegates into being able to understand the expanding field of computer crime investigations and computer forensics. The course will also be covering on how to investigate computer crimes, conducting computer forensic examinations, acquire the required skills to perform the examinations, documenting the findings in a clear concise report, knowing the methodology for conducting an examination, seize and secure digital evidences, validate those evidences for legal arguments, and analyze the web, email and messaging forensics
Key benefits of attending this workshop
By end of this course, delegates will be able to:
- UNDERSTAND the expanding field of computer crime investigations and computer forensics
- INVESTIGATE computer crimes
- CONDUCT computer forensic examinations
- ACQUIRE the required skill set to perform forensically sound computer examination
- DOCUMENT the findings in a clear concise report
- KNOW the methodology for conducting a computer forensic examination
- SEIZE and SECURE digital evidences
- VALIDATE digital evidence for legal argument
- HANDLE evidence from online sources
- ANALYSE the evidence and its characteristics
- LABEL and TAG digital evidence
- ANALYSE computer and operating systems forensics
- ANALYSE web, email and messaging forensics
Who Should Attend?
This course has been specifically designed for corporate and government personnel who, in the performance of their duties, would need to conduct digital forensic examination. This includes personnel who encounter digital evidence while conducting an investigation including from departments of:
- Information Security
- Risk Management
- Loss Prevention
- Corporate Security
- Law Enforcement
Some of the target audiences would include:
- Government and Law Enforcement Investigators
- Police and other Law Enforcement Personnel
- Cyber Crime Investigators
- Digital Forensic Investigators
- E-Business Security Professionals
- Systems Administrators
- Legal Professionals
- IT Managers
Why you should Attend?
Computers and the internet have drastically improved business, communication, media production, and numerous other sectors in today’s society. A majority of organization relies deeply on digital devices and the internet to operate and improve their business, and these businesses depend on the digital devices to process, store and recover data. A large amount of information is produced, accumulated, and distributed via electronic means. Inevitably, such powerful tools are also exploited to commit electronic crimes. Recent research conducted by scientists concluded that up to 90% of all information never leaves the digital domain. This means that the majority of information is being created, modify, and consumed entirely in digital form. Most spreadsheets and databases never make it on paper, and most digital snapshots are never printed. There are many activities such as chats and social networking that are specific to digital and are even unimaginable outside of the virtual realm.
Most such activities leave definite traces, allowing investigators to obtain essential evidence, solve criminal cases, and prevent crimes. This course will guide you through in-depth details on digital evidence for forensic analysis covering areas like handling issues of digital evidence, reviewing regulatory and legal considerations, computer forensic incidents and investigation process, factors affecting evidence acquisition, seizing and securing digital evidence, validating digital evidence for legal argument, mobile and electronic devices for fraud examination, and handling the evidence from online courses. This course will also cover areas involving usage of digital forensic tools for e-discovery, dealing with evidentiary issues and challenges, network and system forensics, conducting computer forensic examination, analyzing windows system, USB and cloud computing issues, and explain thoroughly on the forensic software and reporting.