International Institute of Technology and Applications

Computer Forensic Program

 

This Training Workshop is a quick way to re-energize your career and create new opportunities for professional advancement. With our proven approach to learning, you can excel in Computer Forensics, the first time, guaranteed! Background checks are required.

The Computer Forensics Training and Certification includes instruction on:       

  • Conducting thorough examinations
  • Identifying where and how data is stored
  • Recovering and interpreting data
  • Intense expert instruction and review with a master of forensics
  • Expert instruction from a Certified Computer Forensics Examiner (CCFE- certified Instructor)
  • Hands-on exposure
  • Individual examiner workstations
  • Discover proven investigative strategies and define proper evidence-handling procedures
  • Develop the skills to track an offender on the Internet
  • Learn how to work with law enforcement and how to design an incident response strategy Access to the Information Certification Review Board (IACRB) community which provides you with:
  • Access to knowledge sharing
  • New technology reviews
  • Educational updates
  • Networking with our Forensics Experts/partners with up to 20 Years Experience
  • Drawing appropriate conclusions based on the data

 

Computer Forensics toolkit includes:

  • Access Data (demo)
  • Cell Forensics
  • CMOS Tools
  • Cygwin tools
  • Disk Wipe
  • Dos Utilities
  • EFS Decryption
  • E-mail tools
  • EnCase (demo)
  • File Recovery tools
  • Graphic Viewer
  • Hacking Tools
  • Internet Forensics
  • P2P Forensics
  • Password Hacker
  • PDA Forensics
  • QVP
  • Rifiuti
  • Steganography
  • Viewer
  • X-Ways


Participants:
  • Lawyers/Legal professionals
  • Information Security Officers
  • Information Security Managers
  • Computer Crime Investigators
  • IT Auditors, Consultants
  • Systems and Network Administrators
  • Law Enforcement Investigators
  • HR Managers
  • Law enforcement professionals looking to expand into computer crime investigations
  • IT/IITA pros being tasked with corporate forensics and incident handling
  • Others interested in information security are welcomed.