Twitter Linked In
 

What's On
Cellebrite
Phython in Cellebrite Physical Analyzer Training (CEFA)
Location: Sydney
Starting 15th June 2020
Duration: 5 Days

Cellebrite
Video Evidence Recovery and Analysis Course (VERA) Training
Location: Sydney
Starting 22nd June 2020
Duration: 5 Days

BlackBag Technologies
Apple Forensic Investigations
Location: Sydney CBD
Starting 22nd June 2020
Duration: 5 days

Cellebrite
Cellebrite Certified Operator (CCO) Training
Location: Melbourne
Starting 20th July 2020
Duration: 2 days

Magnet Forensics
Magnet AXIOM macOS Examinations (AX350)
Location: Online
Starting 21st July 2020
Duration: 4 days

Cellebrite
Cellebrite Certified Physical Analyst (CCPA) Training
Location: Melbourne
Starting 22nd July 2020
Duration: 3 Days


Fulcrum Training Vendors
OpenText - EnCase Training
This hands-on course involves practical exercises and real-life simulations in the use of EnCase® Forensic (EnCase) Version 8. The class provides participants with an understanding of the proper handling of digital evidence from the initial seizure of the computer/media, acquisition concepts, including live evidence acquisition. Instruction then progresses to the analysis of the data. It concludes with basic report creation and archiving, validating the data, and restoring the case.
This hands-on 4 day course is designed for investigators with strong computer skills, prior computer forensics training, and experience using the EnCase® Forensic (EnCase). This course builds upon the skills covered in the DF120 – Foundations of Digital Forensics course and enhances the examiner's ability to work efficiently through the use of the unique features of EnCase. Students must understand evidence handling, the structure of the evidence file, creating and using case files, and data acquisition methods, including DOS-based, hardware write protected, crossover cable, and disk-to-disk. It is also important that the students are familiar with the methods for recovering deleted files and folders in a FAT environment, conducting keyword searches across logical and physical media, creating and using EnCase® bookmarks, file signatures and signature analysis, and locating and understanding Windows® artifacts. 

**Formerly EnCase Advanced Computer Forensics

This hands-on course is designed for examiners with solid computer skills, seeking to learn advanced concepts in analyzing Windows artifacts. The participants will be provided instruction that includes parsing and analysis techniques on registry data, volume shadow service, random access memory, zip file structures, prefetch, and SQLite content.


This hands-on course involves practical exercises and challenging real-life case investigations pertaining to Internet-based investigations.  Artifacts from popular peer-to-peer and file sharing programs, such as BitTorrent, Ares, and Gigatribe will be retrieved and examined.  Emails and the Internet are the cornerstones of consumer and business use.  Virtually all examinations ranging from corporate to criminal to cybersecurity investigations will involve the interrogation of email and Internet data.  Artifacts from the most widely utilized Internet browsers, including Internet Explorer/Edge, Firefox, and Chrome will be analyzed.

This online course is designed to provide owners of the EnCase eDiscovery product with essential skills to maximize use. At the end of this one-day course students will be able to create legal holds and manage custodians. The class provides participants with hands-on practice, browsing collected electronically stored information and tagging content appropriately.  Finally legal team members will be able to report on the status of e-discovery legal holds, collections, and reviewed data.

Fulcrum have partnered with OpenText to bring you a special event:

 

What's new in EnCase Security and Forensic Investigations?

 

Join Jeff Headlesky (Tableau & EnCase Forensic Evangelist) and Manfred Hatzesberger (Director of Professional Development and Training for EnCase Products)

 

The challenge of protecting enterprise data has never been greater. A typical G2000 enterprise receives an average of a million security alerts a day and must detect, assess and recover from breaches in near-real time. Post breach, a security operations centre must determine how a breach occurred then take necessary steps to ensure the enterprise is protected going forward.

 

Join us to meet and network with digital investigators, legal teams and security professionals. Share your ideas, learn about emerging trends and find out how OpenText™ solutions deliver insights that help to solve the most challenging security issues. 

 

Learn how to:

·    Get the most from your OpenText™ EnCase™ investments.

·    Detect endpoint threats and quickly respond with forensic-grade remediation.

·    Avoid investigation roadblocks with the most supported digital investigation solution available.

 
Contact us
Australia:+61 (0)2 8012 9810
Singapore:+65 9297 1289
Customer Service:
Technical Support:
Training Bookings:
 
Register For the Fulcrum Newsletter HERE

© Fulcrum Management 2012
Name
Email
Organisation
Phone
Verification Code:
Name
Email
Organisation
Phone
Verification Code: