|This hands-on course involves practical exercises and real-life simulations in the use of EnCase® Forensic (EnCase) Version 8. The class provides participants with an understanding of the proper handling of digital evidence from the initial seizure of the computer/media, acquisition concepts, including live evidence acquisition. Instruction then progresses to the analysis of the data. It concludes with basic report creation and archiving, validating the data, and restoring the case.|
|This hands-on 4 day course is designed for investigators with strong computer skills, prior computer forensics training, and experience using the EnCase® Forensic (EnCase). This course builds upon the skills covered in the DF120 – Foundations of Digital Forensics course and enhances the examiner's ability to work efficiently through the use of the unique features of EnCase. Students must understand evidence handling, the structure of the evidence file, creating and using case files, and data acquisition methods, including DOS-based, hardware write protected, crossover cable, and disk-to-disk. It is also important that the students are familiar with the methods for recovering deleted files and folders in a FAT environment, conducting keyword searches across logical and physical media, creating and using EnCase® bookmarks, file signatures and signature analysis, and locating and understanding Windows® artifacts. |
**Formerly EnCase Advanced Computer Forensics
This hands-on course is designed for examiners with solid computer skills, seeking to learn advanced concepts in analyzing Windows artifacts. The participants will be provided instruction that includes parsing and analysis techniques on registry data, volume shadow service, random access memory, zip file structures, prefetch, and SQLite content.
This hands-on course involves practical exercises and challenging real-life case investigations pertaining to Internet-based investigations. Artifacts from popular peer-to-peer and file sharing programs, such as BitTorrent, Ares, and Gigatribe will be retrieved and examined. Emails and the Internet are the cornerstones of consumer and business use. Virtually all examinations ranging from corporate to criminal to cybersecurity investigations will involve the interrogation of email and Internet data. Artifacts from the most widely utilized Internet browsers, including Internet Explorer/Edge, Firefox, and Chrome will be analyzed.
This online course is designed to provide owners of the EnCase eDiscovery product with essential skills to maximize use. At the end of this one-day course students will be able to create legal holds and manage custodians. The class provides participants with hands-on practice, browsing collected electronically stored information and tagging content appropriately. Finally legal team members will be able to report on the status of e-discovery legal holds, collections, and reviewed data.
Fulcrum have partnered with OpenText to bring you a special event:
What's new in EnCase Security and Forensic Investigations?
Join Jeff Headlesky (Tableau & EnCase Forensic Evangelist) and Manfred Hatzesberger (Director of Professional Development and Training for EnCase Products)
The challenge of protecting enterprise data has never been greater. A typical G2000 enterprise receives an average of a million security alerts a day and must detect, assess and recover from breaches in near-real time. Post breach, a security operations centre must determine how a breach occurred then take necessary steps to ensure the enterprise is protected going forward.
Join us to meet and network with digital investigators, legal teams and security professionals. Share your ideas, learn about emerging trends and find out how OpenText™ solutions deliver insights that help to solve the most challenging security issues.
Learn how to:
· Get the most from your OpenText™ EnCase™ investments.
· Detect endpoint threats and quickly respond with forensic-grade remediation.
· Avoid investigation roadblocks with the most supported digital investigation solution available.