FebSec Forensic is trained in global standards with an experienced staff in information and entry and 2 intermediate levels. In this training process, participants will learn about the bases of forensic computing and how to collect and evaluate evidence in the process of forensic computing.
1. Forensic Computing 101
1.1 Foundation of Forensic Information
2. File System Forensics
2.1 File System Basics
2.2 Ext2, Ext3 and Ext4 Details
2.3 FAT16, FAT32, NTFS and exFat Details
2.4 Hard Drive Images
2.5 Analysis of Hard Drive Images with The Sleuth Kit (TSK)
2.6 Forensic Analysis on the Advanced File System
3. OS Forensics
3.1 Windows Forensics
3.2 Linux Forensics
3.3 Mac OS X Forensics
4. Detailed Analysis
4.1 Network Forensics
4.2 Malware Forensics
Education Time: 5 Day
Who Should Attend: Information security and incident response specialists, information security and information technology auditors, software development specialists interested in software security can participate in training.
Certificate: Participation will be accompanied by a certificate of achievement on the side of our institution and a practical examination to be made as a result of the training.
Education Fee: For more information, you can contact email@example.com.