Facebook Twitter Linked In
 

What's On
AccessData
AccessData FTK BootCamp
Location: CBD, venue to be confirmed.
Starting 4th December 2017
Duration: 3 days

AccessData
AccessData FTK Intermediate
Location: CDB, venue to be confirmed
Starting 7th December 2017
Duration: 3 days (7, 8 & 11 Dec)

AccessData
AccessData Advanced FTK
Location: CBD, venue to be confirmed
Starting 12th December 2017
Duration: 3 days


Fulcrum Training Vendors
X-Ways Software Technology Training
This 3 day Advanced File Systems technical course will explore the workings of all the major file systems (FAT, NTFS, EXFAT, Ext2/3/4, HFS, HFS+).

3-Day instructor led course focused on systematic and efficient examination of computer media using X-Ways Forensics.

Complete and systematic coverage of all computer forensics features in WinHex and X-Ways Forensics. Hands-on exercises, simulating most aspects of the complete computer forensics process. Attendees are encouraged to immediately try newly gained insights as provided by the instructor, with sample image files. Many topics are explained along with their theoretical background (e.g. how .e01 files work internally, how hash databases are internally structured, how deleted partitions are found automatically, with what methods X-Ways Forensics finds deleted files). Other topics are forensically sound disk imaging and cloning, data recovery, search functions, dynamic filtering, report creation, ... Emphasis can be put on any aspect suggested by the participants. You will receive complete printed training material for later repetition. Prerequisite: basic knowledge of computer forensics.

3-Day instructor led course focused on systematic and efficient examination of computer media using X-Ways Forensics.
PLUS
2-Day Instructor led course focused on file systems using X-Ways Forensics.

Extensive introduction to the file systems FAT12, FAT16, FAT32 (1/2 day), NTFS (1 day), and Ext2/Ext3 (1/2 day). By fully understanding the on-disk structures of the file system, you are able to recover data manually in many severe data loss scenarios, where automated recovery software fails, and to verify the correct function of computer forensics software and to collect meta information beyond what is reported automatically, which might yield clues for the given case. In general, this also leads to a better understanding of the data presented by forensic software, of how computer forensics software works and of its limitations.

 
Contact us
Australia:+61 (0)2 8012 9810
Singapore:+65 9297 1289
Customer Service:
Technical Support:
Training Bookings:
 
Register For the Fulcrum Newsletter HERE

© Fulcrum Management 2012
Name
Email
Organisation
Phone
Verification Code:
Name
Email
Organisation
Phone
Verification Code: