Facebook Twitter Linked In

Fulcrum Training Vendors
What's On

Sort by Supplier

The AccessData BootCamp – Advanced is a three-day course providing the knowledge and skills necessary to conduct advanced and specialized functionality of FTK and PRTK. 

This 3 day course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK), FTK Imager and Registry Viewer. 

The AccessData BootCamp – Intermediate three-day course provides the knowledge and skills necessary to install, configure, and effectively use Forensic Toolkit (FTK), Password Recovery Tool Kit (PRTK) and Registry Viewer.

This advanced one day training course provides the knowledge and skills necessary to configure and use the Web Reviewer tool to review case evidence. The Web Reviewer course is a one-day course designed to provide the essential tools needed to perform the basic tasks associated with a case. This course focuses on basic navigation of the AccessData Web Reviewer interface, understanding workflows and searching techniques. 

AccessData Linux Forensics FTK course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit® (FTK), FTK Imager® Password Recovery Toolkit® (PRTK) and Registry Viewer.

This advanced one day course training course provides the knowledge and skills necessary to install, configure, and effectively use the AccessData® Triage software tool. AD Triage allows both forensic examiners and non-forensic personnel to acquire either all or specifically targeted hard drive data from a system in just minutes.

The AccessData BootCamp – Advanced is a three-day course providing the knowledge and skills necessary to conduct advanced and specialized functionality of FTK and PRTK. 

ISP = In-System Programming Learning how to perform In-System Programming techniques to extract data from flash memory chips
JTAG = Joint Test Action Group Learning the proper steps to extract memory data and create pin-out views of integrated circuits

Advanced ISP – JTAG Cell Phone Data Recovery is a certified 5-day course where students learn how to recover data from embedded systems that are locked, damaged or unsupported. This recovery method works on newer devices that store data on eMMC or eMCP flash memory chips and recovered through the device’s test points. Students will learn how to properly identify test points and then create ISP pin-out diagrams that can be used for future digital forensic cases. Students will also learn how to access JTAG connections and apply techniques and methods in order to bypass security and perform memory acquisitions and analysis of this evidence. Course tuition includes the H-11 ISP-JTAG Forensic Kit.

Learn the science of Cryptography and how it plays a role in computer forensics.

Applied Decryption is an intensive, hands-on course that reviews current encryption technology and provides the knowledge and skills necessary to recover passwords using PRTKTM and DNATM. This course introduces advanced cryptography concepts, including encryption standards and file recovery strategies. Participants are guided through a basic cryptographic system, including the elements used to create a File Encryption Key (FEK), passwords, hash functions, salt, passkey, and the FEK itself. 

Over a period of two days, the BlackLight Tool Training course will offer a hands-on investigative approach
addressing best practice techniques for authenticating, analyzing and reporting digital evidence found on Mac
OS X computers, iOS (iPhone, iPad, and iPod Touch) devices and Windows systems. Coursework covers the use of
BlackLight, a comprehensive triage and analysis tool designed to help investigators conduct digital forensic
examinations. After a brief introduction to MacQuisition, BlackBag’s imaging tool, students will triage a full case
and learn the advanced functions of BlackLight though instructor-led exercises and hands-on practical case
This two day course will provide the participant with a thorough understanding of the physical and logical structure of CD and DVD media as well as a thorough grounding in the use of the Infinadyne CD Inspector product for retrieving evidence from CD & DVD media of all types.
Candidates MUST bring a laptop with CD/DVD facilities. The course will be taught in a seminar room.

Cellebrite Advanced Smartphone Analysis (CASA) Course - Advanced

The Cellebrite Advanced Smartphone Analysis (CASA) class is an expert level four day, twenty eight hour course lead by Cellebrite Certi ed Instructors (CCIs). During this Expert Series course students will take an in-depth look into the challenges presented by iOS, Android and Windows Mobile devices. This hands-on class focuses on forensic recovery of application data in SQLite databases, defeating passcodes. In addition, they will learn about analyzing user data in iOS, Android and Windows Mobile devices. In addition to Cellebrite Physical Analyzer software, a variety of forensic investigative methods are used to get the information you need

Cellebrite's Advanced JTAG Extraction (CAJE) training is an expert level four-day certification course lead by Cellebrite Certified Instructors (CCIs).

During this course, participants will learn about the JTAG process, electrical theory, methodologies, and purpose as well as understand the equipment and accessories necessary for successful JTAG extractions. Instructors will help attendees to not only develop, but also to hone fundamental soldering skills, gain practical knowledge with hands-on practice as well as share best practices and legal considerations for processing JTAG extractions. Additionally, participants will learn how to fully leverage the Physical Analyzer to decode JTAG extractions properly. As part of their attendance, participants will receive a RIFF 2 JTAG box, a Z3X Pro (Easy JTAG) box, a Molex adapter kit, a class specific toolkit, and a Cellebrite soldering practice board.
This is the the entry level course for Celebrate Operator training.  The 2 day hands on course covers:
UFED Touch overview and logical, password, and SIM 
extractions plus SIM cloning
UFED Logical Analyzer and UFED reader overview 
Reporting on technical findings
This course is also available via on demand online (as a cheaper option)

This is a hands on 3 days course for Physical Analyst.  The course includes:
File systems and media encoding
UFED Touch overview: File system & physical extractions with password bypass
UFED Physical Analyzer overview
Advanced search techniques
Verification and validation of findings
Reporting on technical findings
Plug-in chain manager
Smart device overview and challenges
This course is also available via on demand online (as a cheaper option)

Computer forensics and the Cloud brings with it unique challenges regarding the acquisition, preservation, and analysis of potential digital evidence. Data can be stored anywhere in the world, and based on its location or country, privacy laws could be an issue. Establishing a chain of custody is also difficult or impossible and the data integrity and authenticity cannot be fully determined. 

This hands-on course involves practical exercises and real-life simulations in the use of EnCase® Forensic (EnCase) Version 8. The class provides participants with an understanding of the proper handling of digital evidence from the initial seizure of the computer/media, acquisition concepts, including live evidence acquisition. Instruction then progresses to the analysis of the data. It concludes with basic report creation and archiving, validating the data, and restoring the case.
This hands-on 4 day course is designed for investigators with strong computer skills, prior computer forensics training, and experience using the EnCase® Forensic (EnCase). This course builds upon the skills covered in the DF120 – Foundations of Digital Forensics course and enhances the examiner's ability to work efficiently through the use of the unique features of EnCase. Students must understand evidence handling, the structure of the evidence file, creating and using case files, and data acquisition methods, including DOS-based, hardware write protected, crossover cable, and disk-to-disk. It is also important that the students are familiar with the methods for recovering deleted files and folders in a FAT environment, conducting keyword searches across logical and physical media, creating and using EnCase® bookmarks, file signatures and signature analysis, and locating and understanding Windows® artifacts. 

**Formerly EnCase Advanced Computer Forensics

This hands-on course is designed for examiners with solid computer skills, seeking to learn advanced concepts in analyzing Windows artifacts. The participants will be provided instruction that includes parsing and analysis techniques on registry data, volume shadow service, random access memory, zip file structures, prefetch, and SQLite content.

This hands-on course involves practical exercises and challenging real-life case investigations pertaining to Internet-based investigations.  Artifacts from popular peer-to-peer and file sharing programs, such as BitTorrent, Ares, and Gigatribe will be retrieved and examined.  Emails and the Internet are the cornerstones of consumer and business use.  Virtually all examinations ranging from corporate to criminal to cybersecurity investigations will involve the interrogation of email and Internet data.  Artifacts from the most widely utilized Internet browsers, including Internet Explorer/Edge, Firefox, and Chrome will be analyzed.

This 3 day Advanced File Systems technical course will explore the workings of all the major file systems (FAT, NTFS, EXFAT, Ext2/3/4, HFS, HFS+).
Forensic Explorer (FEX) is a specialized software tool engineered for the preservation, analysis and presentation of electronic evidence. Primary users of this software are law enforcement, government, military and corporate investigation agencies. This three-day certified training course has been developed to educate all levels of digital forensic investigators on how to best utilize FEX. Participants will perform practical hands on assessment and theory test throughout the training. At the conclusion and successful completion of the course, participants will be awarded the Forensic Explorer Certified Examiner, (FEXCE).

3-Day instructor led course focused on systematic and efficient examination of computer media using X-Ways Forensics.

Complete and systematic coverage of all computer forensics features in WinHex and X-Ways Forensics. Hands-on exercises, simulating most aspects of the complete computer forensics process. Attendees are encouraged to immediately try newly gained insights as provided by the instructor, with sample image files. Many topics are explained along with their theoretical background (e.g. how .e01 files work internally, how hash databases are internally structured, how deleted partitions are found automatically, with what methods X-Ways Forensics finds deleted files). Other topics are forensically sound disk imaging and cloning, data recovery, search functions, dynamic filtering, report creation, ... Emphasis can be put on any aspect suggested by the participants. You will receive complete printed training material for later repetition. Prerequisite: basic knowledge of computer forensics.

3-Day instructor led course focused on systematic and efficient examination of computer media using X-Ways Forensics.
2-Day Instructor led course focused on file systems using X-Ways Forensics.

Extensive introduction to the file systems FAT12, FAT16, FAT32 (1/2 day), NTFS (1 day), and Ext2/Ext3 (1/2 day). By fully understanding the on-disk structures of the file system, you are able to recover data manually in many severe data loss scenarios, where automated recovery software fails, and to verify the correct function of computer forensics software and to collect meta information beyond what is reported automatically, which might yield clues for the given case. In general, this also leads to a better understanding of the data presented by forensic software, of how computer forensics software works and of its limitations.

The most prolific source of evidence available to investigators comes from video cameras. This hands-on 2-day
course exposes students to the latest techniques and methodologies used to accurately interrogate and process
digital multimedia evidence for the purpose of furthering a criminal investigation. Students are directed through
the processes of recovering valuable evidence from video images using the software solution:
course focuses on specialized investigative techniques for the examination of video images to explore issues relating
to batch processing, suspect tracking, metadata analysis, Use of Force, Speed Estimation, and Identification.
Investigators are also exposed to automated methods and practices of producing interactive visual investigation
reports for the accurate disclosure of a video driven investigation.

This one day workshop will familiarise users with the basics of Intella, a product used for email investigation, early case assessment and ediscovery reviews.

This web-based class will enable users to become proficient in the use of Intella®, Vound’s innovative email investigation and eDiscovery tool. Intella’s powerful indexing search engine, its unique visual presentation enables users to quickly, and easily search and review email and electronically stored information to find critical information, visualise relevant relationships, and drill down to the most pertinent evidence.

This course provides students with the knowledge and skills necessary to conduct an effective Internet application based investigation. Students should already be conducting computer based investigations and be familiar with the AccessData suite of tools. Internet based investigations experience would provide additional background knowledge but is not necessary. This is not an undercover investigations course, it is data recovery focused.

This advanced AccessData® training course provides the knowledge and skills necessary to recover and analyze forensic artifacts from the Macintosh operating system using Forensic Toolkit® (FTK®), FTK Imager, and Password Recovery Toolkit® (PRTK®). Participants will learn GPT drive structure and sound methodology for imaging Macintosh hard drives as well as how to obtain date and time information from Macintosh systems. In addition to working with the Macintosh operating system, participants will recover artifacts from Macintosh- associated programs such as Safari and Firefox browsers, iChat, and Apple Mail. Participants will also learn how to recover artifacts from iPod and iPhone devices. 

This 1 hour webinar will introduce you to the Phone Analytics product Mercure 3 from Ockham Solutions

This course trains participants how to effectively use MPE+ to process evidence from mobile devices, which can include GPS devices and removal storage. This course covers the following topics: the MPE+ interface, collections from handsets and SIM cards, extraction of physical data from various device types like iOS and Android, parsing data, searching, bookmarking, visualization, incorporation of MPE+ Tablet and Investigator, export and reporting. 

Students will obtain a start to finish education on the use of Oxygen Forensic® Detective in this 3 day course.  The course adds to the Basic and Expert course by introducing advanced methods of Smart Device collections and data analysis. Students will examine collect and analyze data from iOS, Android, and Windows Phone smart devices.  Students will work to obtain physical images, understand file system formats, storage methods and evidence locations. Students receive training and instruction on Cloud Storage and extraction techniques using Oxygen Forensic® Detective.  SQLite database data is extremely important to today’s smart device examinations.  Not only will students receive training on the SQLite database format and creating SQL queries, but Property Lists, recovering deleted data, write-ahead-logs, shared-memory-files and interpreting database artifacts using the SQLite Viewer and secondary tools are covered. 

The AccessData Password Recovery course provides the knowledge and skills necessary to use PRTK to recover passwords. 

This advanced three-day course provides the knowledge and skills necessary to analyze the new Microsoft® Windows 10® operating system artifacts, user data, and file system mechanics. Participants will review features, learn of artifact locations for Microsoft Edge browser and Cortana, OneDrive, and an overview of core registry files and new values of forensic interest pertaining to user activity on a Windows 10 system. 

This advanced three-day course provides the knowledge and skills necessary to analyze the New Microsoft® Windows 8® operating system artifacts, user data and file system mechanics in Storage Spaces using the Forensic Toolkit (FTK), FTK Imager and Registry Viewer. During this three-day workshop, participants will review Windows 8 features, learn of artifact locations for Internet Explorer and Immersive Application cache data, describe the new File History service and artifact processing. Students will also review Windows 8 artifacts such as Virtual Hard Disks, Storage Pools and updated NTFS structures finishing with an overview of core registry files and new values of forensic interest pertaining to user activity on a Windows 8 system. 

In the continually evolving Windows Forensics series, the Windows registry continues to be a major source of Windows related artifact and information storage. Having the proper knowledge of registry based artifacts can make or break an investigation.

Windows OS Forensics is an advanced training course which provides the knowledge and skills to conduct forensic investigations on the Windows Operating System. Concentration will be placed on artifacts from Windows XP, Windows Vista, and Windows 7. 

Contact us
Australia:+61 (0)2 8012 9810
Singapore:+65 9297 1289
Customer Service:
Technical Support:
Training Bookings:
Register For the Fulcrum Newsletter HERE

© Fulcrum Management 2012
Verification Code:
Verification Code: