Facebook Twitter Linked In
 

What's On
AccessData
Advanced Forensics
Location: Sydney CBD
Starting 12th June 2017
Duration: 5 days

AccessData
Windows OS Forensics
Location: Sydney CBD
Starting 19th June 2017
Duration: 2 days

AccessData
Windows 10 Forensics
Location: Sydney CBD
Starting 21st June 2017
Duration: 3 days


Fulcrum Training Vendors
AccessData Training

AccessData Linux Forensics FTK course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit® (FTK), FTK Imager® Password Recovery Toolkit® (PRTK) and Registry Viewer.

This advanced one day course training course provides the knowledge and skills necessary to install, configure, and effectively use the AccessData® Triage software tool. AD Triage allows both forensic examiners and non-forensic personnel to acquire either all or specifically targeted hard drive data from a system in just minutes.

The AccessData Advanced Forensics five-day course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit (FTKTM), FTK ImagerTM Password Recovery ToolkitTM (PRTKTM) and Registry ViewerTM. Participants will also use AccessData products to conduct forensic investigations on Microsoft Windows systems, learning where and how to locate Windows system artifacts. 

The AccessData Advanced FTK class provides the knowledge and skills necessary to effectively use the advanced analysis features of FTKTM, FTK ImagerTM Password Recovery ToolkitTM (PRTKTM) and Registry ViewerTM. 

Learn the science of Cryptography and how it plays a role in computer forensics.

Applied Decryption is an intensive, hands-on course that reviews current encryption technology and provides the knowledge and skills necessary to recover passwords using PRTKTM and DNATM. This course introduces advanced cryptography concepts, including encryption standards and file recovery strategies. Participants are guided through a basic cryptographic system, including the elements used to create a File Encryption Key (FEK), passwords, hash functions, salt, passkey, and the FEK itself. 

Computer forensics and the Cloud brings with it unique challenges regarding the acquisition, preservation, and analysis of potential digital evidence. Data can be stored anywhere in the world, and based on its location or country, privacy laws could be an issue. Establishing a chain of custody is also difficult or impossible and the data integrity and authenticity cannot be fully determined. 

This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK) and Password Recovery Toolkit (PRTK) to locate and examine e-mail messages, deleted files, free space and file slack.

This advanced one day training course provides the knowledge and skills necessary to configure and use the FTK Web Reviewer tool to review case evidence. The FTK Web Reviewer course is a one-day course designed to provide the essential tools needed to perform the basic tasks associated with a case. This course focuses on basic navigation of the AccessData FTK Web Reviewer interface, understanding workflows and searching techniques. 

This course provides students with the knowledge and skills necessary to conduct an effective Internet application based investigation. Students should already be conducting computer based investigations and be familiar with the AccessData suite of tools. Internet based investigations experience would provide additional background knowledge but is not necessary. This is not an undercover investigations course, it is data recovery focused.

This advanced AccessData training course provides the knowledge and skills necessary to recover and analyze forensic artifacts from the Macintosh operating system using Forensic Toolkit (FTK), FTK Imager, and Password Recovery Toolkit (PRTK). Participants will learn GPT drive structure and sound methodology for imaging Macintosh hard drives as well as how to obtain date and time information from Macintosh systems. In addition to working with the Macintosh operating system, participants will recover artifacts from Macintosh- associated programs such as Safari and Firefox browsers, iChat, and Apple Mail. Participants will also learn how to recover artifacts from iPod and iPhone devices. 

This course trains participants how to effectively use MPE+ to process evidence from mobile devices, which can include GPS devices and removal storage. This course covers the following topics: the MPE+ interface, collections from handsets and SIM cards, extraction of physical data from various device types like iOS and Android, parsing data, searching, bookmarking, visualization, incorporation of MPE+ Tablet and Investigator, export and reporting. 

The AccessData Password Recovery course provides the knowledge and skills necessary to use PRTK to recover passwords. 

This advanced three-day course provides the knowledge and skills necessary to analyze the new Microsoft Windows 10 operating system artifacts, user data, and file system mechanics. Participants will review features, learn of artifact locations for Microsoft Edge browser and Cortana, OneDrive, and an overview of core registry files and new values of forensic interest pertaining to user activity on a Windows 10 system. 

This advanced three-day course provides the knowledge and skills necessary to analyze the New Microsoft Windows 8 operating system artifacts, user data and file system mechanics in Storage Spaces using the Forensic Toolkit (FTK), FTK Imager and Registry Viewer. During this three-day workshop, participants will review Windows 8 features, learn of artifact locations for Internet Explorer and Immersive Application cache data, describe the new File History service and artifact processing. Students will also review Windows 8 artifacts such as Virtual Hard Disks, Storage Pools and updated NTFS structures finishing with an overview of core registry files and new values of forensic interest pertaining to user activity on a Windows 8 system. 

In the continually evolving Windows Forensics series, the Windows registry continues to be a major source of Windows related artifact and information storage. Having the proper knowledge of registry based artifacts can make or break an investigation.

Windows OS Forensics is an advanced training course which provides the knowledge and skills to conduct forensic investigations on the Windows Operating System. Concentration will be placed on artifacts from Windows XP, Windows Vista, and Windows 7. 

 
Contact us
Australia:+61 (0)2 8012 9810
Singapore:+65 9297 1289
Customer Service:
Technical Support:
Training Bookings:
 
Register For the Fulcrum Newsletter HERE

© Fulcrum Management 2012
Name
Email
Organisation
Phone
Verification Code:
Name
Email
Organisation
Phone
Verification Code: