Facebook Twitter Linked In
 

What's On
AccessData
AccessData FTK BootCamp
Location: CBD, venue to be confirmed.
Starting 4th December 2017
Duration: 3 days

AccessData
AccessData FTK Intermediate
Location: CDB, venue to be confirmed
Starting 7th December 2017
Duration: 3 days (7, 8 & 11 Dec)

AccessData
AccessData Advanced FTK
Location: CBD, venue to be confirmed
Starting 12th December 2017
Duration: 3 days


Fulcrum Training Vendors
Guidance Software Training
This hands-on course involves practical exercises and real-life simulations in the use of EnCase® Forensic (EnCase) Version 8. The class provides participants with an understanding of the proper handling of digital evidence from the initial seizure of the computer/media, acquisition concepts, including live evidence acquisition. Instruction then progresses to the analysis of the data. It concludes with basic report creation and archiving, validating the data, and restoring the case.
This hands-on 4 day course is designed for investigators with strong computer skills, prior computer forensics training, and experience using the EnCase® Forensic (EnCase). This course builds upon the skills covered in the DF120 – Foundations of Digital Forensics course and enhances the examiner's ability to work efficiently through the use of the unique features of EnCase. Students must understand evidence handling, the structure of the evidence file, creating and using case files, and data acquisition methods, including DOS-based, hardware write protected, crossover cable, and disk-to-disk. It is also important that the students are familiar with the methods for recovering deleted files and folders in a FAT environment, conducting keyword searches across logical and physical media, creating and using EnCase® bookmarks, file signatures and signature analysis, and locating and understanding Windows® artifacts. 

**Formerly EnCase Advanced Computer Forensics

This hands-on course is designed for examiners with solid computer skills, seeking to learn advanced concepts in analyzing Windows artifacts. The participants will be provided instruction that includes parsing and analysis techniques on registry data, volume shadow service, random access memory, zip file structures, prefetch, and SQLite content.


This hands-on course involves practical exercises and challenging real-life case investigations pertaining to Internet-based investigations.  Artifacts from popular peer-to-peer and file sharing programs, such as BitTorrent, Ares, and Gigatribe will be retrieved and examined.  Emails and the Internet are the cornerstones of consumer and business use.  Virtually all examinations ranging from corporate to criminal to cybersecurity investigations will involve the interrogation of email and Internet data.  Artifacts from the most widely utilized Internet browsers, including Internet Explorer/Edge, Firefox, and Chrome will be analyzed.

 
Contact us
Australia:+61 (0)2 8012 9810
Singapore:+65 9297 1289
Customer Service:
Technical Support:
Training Bookings:
 
Register For the Fulcrum Newsletter HERE

© Fulcrum Management 2012
Name
Email
Organisation
Phone
Verification Code:
Name
Email
Organisation
Phone
Verification Code: