Wednesday, February 28, 2007

Director by John King

The time for Computer Forensic and Cyber Investigations training is now. The simple definition of Computer Forensics, "is the use of specialized techniques for recovery, authentication, and analysis of electronic data when a case involves issues relating to reconstruction of computer usage, examination of residual data, authentication of data by technical analysis or explanation of technical features of data and computer usage. Computer forensics requires specialized expertise that goes beyond normal data collection and preservation techniques available to end-users or system support personnel. Computer forensics is done in a fashion that adheres to the standards of evidence that are admissible in a court of law. Thus, computer forensics must be techno-legal in nature rather than purely technical. Our intensive instructor led course is designed to give a solid foundation in the theory and practice of essential computer forensic techniques. High-profile cases of corporate malfeasance and increased attention paid to cyber crime and cyber terrorism have elevated electronic evidence discovery to an indispensable component of any organization's security plan. The demand for computer forensics investigators is HOT.Several labor forecasts predict a shortfall of nearly 50,000 within the IS security profession, too. The time for Computer Forensic and Cyber Investigations training is now. With advanced skills, Computer Forensics professionals are among the technology industry's highest-paid workers, according to a recent survey by the System Administration Networking and Security Institute. Who Should Attend Anyone involved in the security of Information Assets including: Information Security Officers, Information Security Managers, Computer Crime Investigators, IT Auditors, Consultants, Systems and Network Administrators, Law Enforcement Investigators, lawyers, HR Managers, and others interested in information security are welcome. Prerequisites: Students must ideally have some work experience in any of the following three areas: Computer and software support, Computer networking or Information security
Courses we offer: Introduction to Computer Forensics - 4 days
How to Create Images and Forensic Imaging Methodologies - 2 days Email Investigations - 2 days
Server Investigations - UNIX, Windows, Linux - 2 days
Advanced Forensics (Network Based Investigations) - 4 days
Hacking Countermeasures - Certified Ethical Hacking (CEH) - 5 days Why Choose KCI for Computer Forensic Training? * Our courses emphasize technique and methodology, regardless of the software package used. * Recovering Data from a "Live System" * Real World Training Environment * The training environments are interactive * Work on case files in a hands-on environment. * Learn the Latest Techniques * Experienced Investigators Teach The Courses * Small Class Size * Vendor Neutral - Learn To Use Many Forensic Tools
The information learned in class will have an immediate impact upon return to work.
Upon successful completion of the course, the student will be prepared to obtain certification in the Computer Forensics field.

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home