{"id":1928,"date":"2024-09-20T08:58:24","date_gmt":"2024-09-20T08:58:24","guid":{"rendered":"https:\/\/icmscyber.com\/?page_id=1928"},"modified":"2025-09-09T07:57:35","modified_gmt":"2025-09-09T07:57:35","slug":"digital-forensic-awareness-incident-response-course","status":"publish","type":"page","link":"https:\/\/icmscyber.com\/ja\/training\/digital-forensic-awareness-incident-response-course\/","title":{"rendered":"Digital Forensics Awareness &amp; Incident Response Course"},"content":{"rendered":"<div class=\"section-wrapper\" data-id=\"U7oYFw\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-U7oYFw layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-H9dPr0\"><div class=\"guten-column-wrapper\" data-id=\"H9dPr0\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-GAGgst\"><div class=\"guten-column-wrapper\" data-id=\"GAGgst\">\n<div class=\"guten-SH75xz guten-image-box guten-element style-default\"><div class=\"inner-container\"><div class=\"image-box-header\"><img decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/09\/Forensic-Awareness.png\" height=\"491\" width=\"491\" alt=\"Forensic Awareness\"\/><\/div><div class=\"image-box-body\"><div class=\"body-inner\"><h3 class=\"body-title icon-position-before\"><i><\/i><span>Digital Forensics Awareness &#038; Incident Response Course<\/span><\/h3><p class=\"body-description\">A \u200b1-Day Digital Forensics Awareness and Incident Response Training course! This intensive one-day training is specifically designed for IT staff who may encounter cyber security threats in their roles.<br>Throughout this course, you will gain a comprehensive understanding of computer forensics, including the fundamental techniques used by professional computer forensic investigators. You will learn how to effectively respond to cyber security incidents and preserve electronic data in a manner that maintains its integrity as evidence.<br>By the end of this training, you will be equipped with the knowledge and skills to handle cyber security threats confidently and use basic forensic tools to ensure data is preserved correctly. Join us to enhance your capabilities in safeguarding your organisation&#8217;s digital assets.<\/p><\/div><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-OU44yS\"><div class=\"guten-column-wrapper\" data-id=\"OU44yS\"><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"IDUK9G\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-IDUK9G layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Y4S8hG\"><div class=\"guten-column-wrapper\" data-id=\"Y4S8hG\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-UwkVvb\"><div class=\"guten-column-wrapper\" data-id=\"UwkVvb\">\n<h2 class=\"wp-block-heading has-normal-font-size\">\u72d9\u3044:<\/h2>\n\n\n\n<div class=\"guten-element guten-spacer guten-tt07BC\"><\/div>\n\n\n\n<p>The primary aim of this course is to equip IT staff with the essential knowledge and skills required to effectively respond to cyber security threats. Participants will gain a thorough understanding of computer forensics principles and techniques, enabling them to handle and preserve electronic data in a manner that maintains its integrity as evidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-normal-font-size\">\u6210\u679c:<\/h2>\n\n\n\n<div class=\"guten-element guten-spacer guten-I4MnxC\"><\/div>\n\n\n\n<p>By the end of this training, participants will be able to:<br>\u2022 Understand the basics of computer forensics and the role of a forensic investigator.<br>\u2022 Use basic forensic tools to preserve electronic data in an evidentially sound manner.<br>\u2022 Enhance their ability to safeguard their organisation&#8217;s digital assets against cyber threats.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-jt6msB\"><div class=\"guten-column-wrapper\" data-id=\"jt6msB\"><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"8ip8t9\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-8ip8t9 layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-DZRg7k\"><div class=\"guten-column-wrapper\" data-id=\"DZRg7k\">\n<h2 class=\"wp-block-heading has-normal-font-size\">\u30b3\u30fc\u30b9\u5185\u5bb9:<\/h2>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-pCXI8y\"><div class=\"guten-column-wrapper\" data-id=\"pCXI8y\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-RwQjYi\"><div class=\"guten-column-wrapper\" data-id=\"RwQjYi\"><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"HCNw7a\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-HCNw7a layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-nJyEHL\"><div class=\"guten-column-wrapper\" data-id=\"nJyEHL\">\n<ul class=\"wp-block-list\">\n<li>\u30c7\u30fc\u30bf\u9055\u53cd\u306e\u50be\u5411<\/li>\n\n\n\n<li>Defining a Cyber Threat<\/li>\n\n\n\n<li>Sources of Cyber Threats<\/li>\n\n\n\n<li>\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u8a08\u753b\u306e\u4f5c\u6210<\/li>\n\n\n\n<li>\u8a3c\u62e0\u6e90\u306e\u7279\u5b9a<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-JTre0T\"><div class=\"guten-column-wrapper\" data-id=\"JTre0T\">\n<ul class=\"wp-block-list\">\n<li>Why is Digital Forensics Important to Your Organisation?<\/li>\n\n\n\n<li>\u6cd5\u7684\u8003\u5bdf<\/li>\n\n\n\n<li>\u8a3c\u62e0\u306e\u53d6\u308a\u6271\u3044\u3068\u6d41\u901a\u904e\u7a0b\u306e\u7ba1\u7406<\/li>\n\n\n\n<li>Electronic Evidence &amp; the Courts<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-HXs3Rd\"><div class=\"guten-column-wrapper\" data-id=\"HXs3Rd\">\n<ul class=\"wp-block-list\">\n<li>\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u306e\u30a2\u30af\u30a4\u30b8\u30b7\u30e7\u30f3\u30c4\u30fc\u30eb<\/li>\n\n\n\n<li>Hash Values ( Digital Fingerprints)<\/li>\n\n\n\n<li>\u672c\u756a\u30b7\u30b9\u30c6\u30e0\u3078\u306e\u5bfe\u5fdc<\/li>\n\n\n\n<li>Capturing Ram Memory<\/li>\n\n\n\n<li>\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u53d6\u5f97\u5831\u544a\u66f8\u306e\u4f5c\u6210\u65b9\u6cd5<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"guten-element guten-spacer guten-CktknK\"><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":657,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-1928","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages\/1928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/comments?post=1928"}],"version-history":[{"count":0,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages\/1928\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages\/657"}],"wp:attachment":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/media?parent=1928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}