Digital Forensics Awareness & Incident Response Course

Forensic Awareness

Digital Forensics Awareness & Incident Response Course

A ​1-Day Digital Forensics Awareness and Incident Response Training course! This intensive one-day training is specifically designed for IT staff who may encounter cyber security threats in their roles.
Throughout this course, you will gain a comprehensive understanding of computer forensics, including the fundamental techniques used by professional computer forensic investigators. You will learn how to effectively respond to cyber security incidents and preserve electronic data in a manner that maintains its integrity as evidence.
By the end of this training, you will be equipped with the knowledge and skills to handle cyber security threats confidently and use basic forensic tools to ensure data is preserved correctly. Join us to enhance your capabilities in safeguarding your organisation’s digital assets.

Aim:

The primary aim of this course is to equip IT staff with the essential knowledge and skills required to effectively respond to cyber security threats. Participants will gain a thorough understanding of computer forensics principles and techniques, enabling them to handle and preserve electronic data in a manner that maintains its integrity as evidence.

Outcome:

By the end of this training, participants will be able to:
• Understand the basics of computer forensics and the role of a forensic investigator.
• Use basic forensic tools to preserve electronic data in an evidentially sound manner.
• Enhance their ability to safeguard their organisation’s digital assets against cyber threats.

Course Content:

  • Data Breach Trends
  • Defining a Cyber Threat
  • Sources of Cyber Threats
  • Preparing an Incident Response Plan
  • Identifying Sources of Evidence
  • Why is Digital Forensics Important to Your Organisation?
  • Legal Considerations
  • Evidence Handling & Chain of Custody
  • Electronic Evidence & the Courts
  • Forensic Acquisition Tools
  • Hash Values ( Digital Fingerprints)
  • Dealing with Live Systems
  • Capturing Ram Memory
  • How to Prepare a Forensic Acquisition Report
en_USEnglish