
DIGITAL FORENSICS AND CYBER INVESTIGATIONS
Why Attend
The requirement for operational Incident Response, and Digital Forensic disciplines and procedures, has been forced to evolve in the last decade – driven by the increase of unprecedented cyber breaches, and associated cyber-crimes. Data breaches and intrusions have also evolved to more complex engagements, presenting the need for a robust in-house Digital Forensics/First Responder capability.
This course enables participants to engage with, and to investigate, both internal and external digital crimes and infractions. Applying robust processes and procedures which encompass the Digital Forensic acquisition of images, from media and artifacts to computers and mobile technologies. Aligned with tough proven processes to secure evidential materials, participants have the opportunity to apply best practices to assure associated evidential integrity and value is maintained intact.
From a background of “in-the-field” law enfacement, associated with the key concepts of legal practices, this course will provide hands-on pragmatic experiences, underpinned by the academic and legal structures which form the basis of Forensic Science.
Including the key requirements of the Secure Operational Centre (SOC) and its interfaces with the Computer Security Incident Response Team (CSIRT), this course will provide participants with the skills they require to respond to a digital investigation with the assurance of completing it correctly.
Course Methodology
This course relies on the use of individual and group exercises aimed at helping participants learn all the key activities related to contract management. The course also features the use of a number of case studies and role plays by participants followed by discussions. In addition, this course incorporates pre and post testing.
Course Objectives
By the end of the course, participants will be able to:
- Manage information technology projects using different project management methodologies
- Evaluate the business case of IT projects to ensure feasibility and proper justifications
- Relate project requirements and objectives to stakeholders’ needs in a clear and compelling manner
- Explain fundamental project planning activities and processes and set realistic measurable objectives in terms of time and cost using proven project planning techniques
- Identify the role of the project manager during the design and the implementation phases of the project
- Outline all the activities during the execution phase of a project and establish an effective control process to ensure execution in line with the project plans
Target Audience
Project managers and senior IT professionals who seek to manage small to large size IT projects or to broaden their knowledge in the key project management functions. This course is designed to complement the technical knowledge of IT professionals involved in an IT project with the necessary project management skills. Meirc is assigned as a Registered Educational Provider (REP) with the Project Management Institute (PMI®). This course is worth 30 Professional Development Units (PDUs).
Target Competencies
- Project management
- IT management
- Developing project planning and scheduling
- Understanding project costing
- Capital budgeting
- Developing project control
- Risk management
Course Outline
- Digital forensics – background and legal practices
- Introduction to the science of forensics
- Terms and definitions
- Chain of digital crime
- The background of digital crime
- Case histories of real-life cases
- Digital forensics – law
- Digital forensics – legislation
- Standards of digital forensics
- Fundamentals of digital forensics
- The risks faced by organizations
- The digital forensics response framework
- The first responder digital forensics toolkit
- Scene of digital crime management
- The Secure Operations Centre (SOC)
- The CSIRT (Computer Security Incident Response Team)
- Roles and responsibilities
- Implementing a framework
- Case management
- Collecting and processing digital evidence
- Domain Name System (DNS)
- Extended security infrastructures
- Investigating mobile technologies
- Acquisition of digital evidence and artifacts
- Handling of digital evidence and artifacts
- Processing of digital evidence and artifacts
- Case management protocols
- Wireless protocols
- Supporting technologies
- Reporting practices
- Investigations of internal and external digital crimes
- OSINT (Open Source Intelligence)
- Its place in the digital forensic investigation
- Defining internal crimes
- Defining external crimes
- Child exploitation and investigations
- Malicious applications
- Ransomware
- Anti-forensics capabilities
- Digital forensics and terrorism