Twitter Linked In

Internet Forensics
Sorry there are currently no sessions scheduled for Internet Forensics.
Please let us know you are interested in this course.

Fulcrum Training Vendors
Internet Forensics

This course provides students with the knowledge and skills necessary to conduct an effective Internet application based investigation. Students should already be conducting computer based investigations and be familiar with the AccessData suite of tools. Internet based investigations experience would provide additional background knowledge but is not necessary. This is not an undercover investigations course, it is data recovery focused.

The Internet Forensics course provides the knowledge and skills necessary to use AccessDataTM tools to recover forensic information from Internet trace evidence artifacts. Participants learn where and how to locate evidence from Internet browsers, Instant Messenger (IM) clients, and social network sites using Forensic ToolkitTM (FTKTM), Registry ViewerTM, and Password Recovery ToolkitTM (PRTKTM).


Although there are no specific prerequisites for this course, the following recommendations will enable students to realize the greatest benefit from the training:

Able to understand course curriculum presented in English
Attend the AccessData BootCamp or have equivalent experience
Have previous investigative experience in forensic case work, in either public or private sector Be familiar with the Microsoft Windows environment
User-level understanding of Internet applications such as browsers, Instant Messenger clients, and social networking sites

Class Materials and Software:

You will receive the associated materials prior to the course.

During this three-day hands-on course, participants perform the following tasks:

Locate, and process, Internet browser client trace evidence for: o Preferences and settings
o History
o Internet cache

o Bookmarks/Favorites o Cookies
o Downloads
o Search queries

o Autocomplete, and Form Data o Webpage authentication

Identify, and process, Instant Messenger (IM) clients for: o Local user, and Contact, information
o Archived instant messages
o Transactional log files

o File transfer, and sharing information Examine the Windows registry for:

o Internet browser, and IM client user preferences
o Local user and contact information for IM and social network clients o Browsing history, bookmarks, and downloads
o Search queries, form data, and Webpage authentication

Use the interoperability between AccessData products to:
o Decrypt Webpage authentication user name, and passwords
o Decrypt search queries, form data, and e-mail account information
o Bookmark and generated relevant reports, in support of an Internet-based investigation

Students will have hands-on labs that allow them to apply what they have learned to a mock case. These performance-based simulations are designed to help participants retain information learned during the training. 

Internet Forensics
Sorry - there are no sessions available to book.
Contact us
Australia:+61 (0)2 8012 9810
Singapore:+65 9297 1289
Customer Service:
Technical Support:
Training Bookings:
Register For the Fulcrum Newsletter HERE

© Fulcrum Management 2012
Verification Code:
Verification Code: