Facebook Twitter Linked In
 

Fulcrum Training Vendors
What's On

Training
Sort by Supplier

AccessData Linux Forensics FTK course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit® (FTK), FTK Imager® Password Recovery Toolkit® (PRTK) and Registry Viewer.

This advanced one day course training course provides the knowledge and skills necessary to install, configure, and effectively use the AccessData® Triage software tool. AD Triage allows both forensic examiners and non-forensic personnel to acquire either all or specifically targeted hard drive data from a system in just minutes.

The AccessData Advanced Forensics five-day course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit (FTKTM), FTK ImagerTM Password Recovery ToolkitTM (PRTKTM) and Registry ViewerTM. Participants will also use AccessData products to conduct forensic investigations on Microsoft Windows systems, learning where and how to locate Windows system artifacts. 

The AccessData Advanced FTK class provides the knowledge and skills necessary to effectively use the advanced analysis features of FTKTM, FTK ImagerTM Password Recovery ToolkitTM (PRTKTM) and Registry ViewerTM. 

Learn the science of Cryptography and how it plays a role in computer forensics.

Applied Decryption is an intensive, hands-on course that reviews current encryption technology and provides the knowledge and skills necessary to recover passwords using PRTKTM and DNATM. This course introduces advanced cryptography concepts, including encryption standards and file recovery strategies. Participants are guided through a basic cryptographic system, including the elements used to create a File Encryption Key (FEK), passwords, hash functions, salt, passkey, and the FEK itself. 

Over a period of two days, the BlackLight Tool Training course will offer a hands-on investigative approach
addressing best practice techniques for authenticating, analyzing and reporting digital evidence found on Mac
OS X computers, iOS (iPhone, iPad, and iPod Touch) devices and Windows systems. Coursework covers the use of
BlackLight, a comprehensive triage and analysis tool designed to help investigators conduct digital forensic
examinations. After a brief introduction to MacQuisition, BlackBags imaging tool, students will triage a full case
and learn the advanced functions of BlackLight though instructor-led exercises and hands-on practical case
studies.
This hands-on 4 day course is designed for investigators with strong computer skills, prior computer forensics training, and experience using the EnCase Forensic (EnCase). This course builds upon the skills covered in the DF120 Foundations of Digital Forensics course and enhances the examiner's ability to work efficiently through the use of the unique features of EnCase. Students must understand evidence handling, the structure of the evidence file, creating and using case files, and data acquisition methods, including DOS-based, hardware write protected, crossover cable, and disk-to-disk. It is also important that the students are familiar with the methods for recovering deleted files and folders in a FAT environment, conducting keyword searches across logical and physical media, creating and using EnCase bookmarks, file signatures and signature analysis, and locating and understanding Windows artifacts. 
This two day course will provide the participant with a thorough understanding of the physical and logical structure of CD and DVD media as well as a thorough grounding in the use of the Infinadyne CD Inspector product for retrieving evidence from CD & DVD media of all types.
Candidates MUST bring a laptop with CD/DVD facilities. The course will be taught in a seminar room.

Computer forensics and the Cloud brings with it unique challenges regarding the acquisition, preservation, and analysis of potential digital evidence. Data can be stored anywhere in the world, and based on its location or country, privacy laws could be an issue. Establishing a chain of custody is also difficult or impossible and the data integrity and authenticity cannot be fully determined. 

This on demand online course involves practical exercises and real-life simulations in the use of EnCase Forensic version 7 (EnCase v7). The class provides participants with an understanding of the proper handling of digital evidence from the initial seizure of the computer/media, acquisition concepts, including live evidence acquisition. Instruction then progresses to the analysis of the data. It concludes with archiving, validating the data, and basic report creation.

(Not available from Fulcrum Asia)

This on demand online course is designed for investigators with strong computer skills, prior computer forensics training, and experience using the EnCase Forensic (EnCase). This course builds upon the skills covered in the EnCase Computer Forensics I course and enhances the examiner's ability to work efficiently through the use of the unique features of EnCase. 

Students must understand evidence handling, the structure of the evidence file, creating and using case files, and data acquisition methods, including DOS-based, hardware write protected, crossover cable, and disk-to-disk. It is also important that the students are familiar with the methods for recovering deleted files and folders in a FAT environment, conducting keyword searches across logical and physical media, creating and using EnCase bookmarks, file signatures and signature analysis, and locating and understanding Windows artefacts.

(Not available from Fulcrum Asia)

This online course is designed to provide owners of the EnCase eDiscovery product with essential skills to maximize use. At the end of this one-day course students will be able to create legal holds and manage custodians. The class provides participants with hands-on practice, browsing collected electronically stored information and tagging content appropriately.  Finally legal team members will be able to report on the status of e-discovery legal holds, collections, and reviewed data.

This hands-on course is designed for EnCase users who are preparing for the EnCE (EnCase Certified Examiner) certification process. The EnCE certification is a highly sought-after accreditation, which requires significant knowledge of computer forensics and Guidance Softwares EnCase product to successfully achieve. The two-phase testing process is based upon a written examination and also the completion of a thorough practical scenario examination and preparation of an investigative report. The certification is based upon the practical computer forensic skills and knowledge presented in Guidance Softwares EnCase Computer Forensic I and Computer Forensic II courses. The EnCE Prep course is NOT intended to be a replacement for these two classes. Instead it is a thorough but accelerated review of the subjects covered in those courses. Students cannot waive or substitute the prerequisite attendance of Guidance Softwares EnCase Computer Forensics II course when applying to attend the EnCE Prep course. 
Delivery method: Group-Live. NASBA defined level: intermediate.
This 3 day Advanced File Systems technical course will explore the workings of all the major file systems (FAT, NTFS, EXFAT, Ext2/3/4, HFS, HFS+).
Forensic Explorer (FEX) is a specialized software tool engineered for the preservation, analysis and presentation of electronic evidence. Primary users of this software are law enforcement, government, military and corporate investigation agencies. This three-day certified training course has been developed to educate all levels of digital forensic investigators on how to best utilize FEX. Participants will perform practical hands on assessment and theory test throughout the training. At the conclusion and successful completion of the course, participants will be awarded the Forensic Explorer Certified Examiner, (FEXCE).

3-Day instructor led course focused on systematic and efficient examination of computer media using X-Ways Forensics.

Complete and systematic coverage of all computer forensics features in WinHex and X-Ways Forensics. Hands-on exercises, simulating most aspects of the complete computer forensics process. Attendees are encouraged to immediately try newly gained insights as provided by the instructor, with sample image files. Many topics are explained along with their theoretical background (e.g. how .e01 files work internally, how hash databases are internally structured, how deleted partitions are found automatically, with what methods X-Ways Forensics finds deleted files). Other topics are forensically sound disk imaging and cloning, data recovery, search functions, dynamic filtering, report creation, ... Emphasis can be put on any aspect suggested by the participants. You will receive complete printed training material for later repetition. Prerequisite: basic knowledge of computer forensics.

3-Day instructor led course focused on systematic and efficient examination of computer media using X-Ways Forensics.
PLUS
2-Day Instructor led course focused on file systems using X-Ways Forensics.

Extensive introduction to the file systems FAT12, FAT16, FAT32 (1/2 day), NTFS (1 day), and Ext2/Ext3 (1/2 day). By fully understanding the on-disk structures of the file system, you are able to recover data manually in many severe data loss scenarios, where automated recovery software fails, and to verify the correct function of computer forensics software and to collect meta information beyond what is reported automatically, which might yield clues for the given case. In general, this also leads to a better understanding of the data presented by forensic software, of how computer forensics software works and of its limitations.

This hands-on course involves practical exercises and real-life simulations in the use of EnCase Forensic (EnCase) Version 8. The class provides participants with an understanding of the proper handling of digital evidence from the initial seizure of the computer/media, acquisition concepts, including live evidence acquisition. Instruction then progresses to the analysis of the data. It concludes with basic report creation and archiving, validating the data, and restoring the case.

This course provides students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData's Forensic Toolkit (FTK) and Password Recovery Toolkit (PRTK) to locate and examine e-mail messages, deleted files, free space and file slack.

This advanced one day training course provides the knowledge and skills necessary to configure and use the FTK Web Reviewer tool to review case evidence. The FTK Web Reviewer course is a one-day course designed to provide the essential tools needed to perform the basic tasks associated with a case. This course focuses on basic navigation of the AccessData FTK Web Reviewer interface, understanding workflows and searching techniques. 

This one day workshop will familiarise users with the basics of Intella, a product used for email investigation, early case assessment and ediscovery reviews.

This web-based class will enable users to become proficient in the use of Intella®, Vound’s innovative email investigation and eDiscovery tool. Intella’s powerful indexing search engine, its unique visual presentation enables users to quickly, and easily search and review email and electronically stored information to find critical information, visualise relevant relationships, and drill down to the most pertinent evidence.

This course provides students with the knowledge and skills necessary to conduct an effective Internet application based investigation. Students should already be conducting computer based investigations and be familiar with the AccessData suite of tools. Internet based investigations experience would provide additional background knowledge but is not necessary. This is not an undercover investigations course, it is data recovery focused.

This advanced AccessData training course provides the knowledge and skills necessary to recover and analyze forensic artifacts from the Macintosh operating system using Forensic Toolkit (FTK), FTK Imager, and Password Recovery Toolkit (PRTK). Participants will learn GPT drive structure and sound methodology for imaging Macintosh hard drives as well as how to obtain date and time information from Macintosh systems. In addition to working with the Macintosh operating system, participants will recover artifacts from Macintosh- associated programs such as Safari and Firefox browsers, iChat, and Apple Mail. Participants will also learn how to recover artifacts from iPod and iPhone devices. 

This 1 hour webinar will introduce you to the Phone Analytics product Mercure 3 from Ockham Solutions

This course trains participants how to effectively use MPE+ to process evidence from mobile devices, which can include GPS devices and removal storage. This course covers the following topics: the MPE+ interface, collections from handsets and SIM cards, extraction of physical data from various device types like iOS and Android, parsing data, searching, bookmarking, visualization, incorporation of MPE+ Tablet and Investigator, export and reporting. 

Students will obtain a start to finish education on the use of Oxygen Forensic Detective in this 3 day course.  The course adds to the Basic and Expert course by introducing advanced methods of Smart Device collections and data analysis. Students will examine collect and analyze data from iOS, Android, and Windows Phone smart devices.  Students will work to obtain physical images, understand file system formats, storage methods and evidence locations. Students receive training and instruction on Cloud Storage and extraction techniques using Oxygen Forensic Detective.  SQLite database data is extremely important to todays smart device examinations.  Not only will students receive training on the SQLite database format and creating SQL queries, but Property Lists, recovering deleted data, write-ahead-logs, shared-memory-files and interpreting database artifacts using the SQLite Viewer and secondary tools are covered. 

The AccessData Password Recovery course provides the knowledge and skills necessary to use PRTK to recover passwords. 

This advanced three-day course provides the knowledge and skills necessary to analyze the new Microsoft Windows 10 operating system artifacts, user data, and file system mechanics. Participants will review features, learn of artifact locations for Microsoft Edge browser and Cortana, OneDrive, and an overview of core registry files and new values of forensic interest pertaining to user activity on a Windows 10 system. 

This advanced three-day course provides the knowledge and skills necessary to analyze the New Microsoft Windows 8 operating system artifacts, user data and file system mechanics in Storage Spaces using the Forensic Toolkit (FTK), FTK Imager and Registry Viewer. During this three-day workshop, participants will review Windows 8 features, learn of artifact locations for Internet Explorer and Immersive Application cache data, describe the new File History service and artifact processing. Students will also review Windows 8 artifacts such as Virtual Hard Disks, Storage Pools and updated NTFS structures finishing with an overview of core registry files and new values of forensic interest pertaining to user activity on a Windows 8 system. 

In the continually evolving Windows Forensics series, the Windows registry continues to be a major source of Windows related artifact and information storage. Having the proper knowledge of registry based artifacts can make or break an investigation.

Windows OS Forensics is an advanced training course which provides the knowledge and skills to conduct forensic investigations on the Windows Operating System. Concentration will be placed on artifacts from Windows XP, Windows Vista, and Windows 7. 

 
Contact us
Australia:+61 (0)2 8012 9810
Singapore:+65 9297 1289
Customer Service:
Technical Support:
Training Bookings:
 
Register For the Fulcrum Newsletter HERE

© Fulcrum Management 2012
Name
Email
Organisation
Phone
Verification Code:
Name
Email
Organisation
Phone
Verification Code: