Computer Forensics Awareness and Incident Response (Thai)
Date/Time: 02/03/2020 9:30 am - 4:30 pm
About this course
A one day training course aimed at IT staff that may have to deal with cyber security threats. The course will provide the candidate with an explanation of what is computer forensics and the techniques regularly employed by computer forensic investigators. The candidate will be trained how to respond to cyber security threats and how to preserve the electronic data in an evidently sound manner using a basic forensic tool.
The EC-Council’s Network Security Administrator certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.
Who Should attend?
Course Level: The course is aimed at IT teams that have no knowledge or limited knowledge in relation to computer forensics and computer forensics techniques.
Aim of the Course:
The aim of the course is to provide the candidate with an explanation of what is computer forensics, the issues in obtaining computer evidence and the forensic techniques regularly employed by forensic investigator. The aim is to provide the candidate with the knowledge to prepare a cyber-security incident response plan and training in using a basic forensic tool to preserve the digital data in an evidently sound manner.
The course will cover the following subjects:
- FTK Imager
- About the Course
- Installing FTK Imager Highlights from the 2014 Global Economic Crime Survey
- Exercise – Previewing Hard Drive
- What is Computer Forensics?
- Exercise – Creating Forensic Image
- Sources of Evidence
- Exercise – Creating Custom Content Forensic Image
- Why is Computer Forensics Important to your Organisation?
- Mounting a Forensic Image
- The Four Principles of Computer Based Evidence
- Exercise – Mounting a forensic Image
- The Forensic Image
- Memory Capture
- Cloned Drives
- Exercise 5.0 – Capturing RAM Memory
- The Four Levels of Computer Data
- USB Forensic Bootable Hard Drives
- The Unallocated Space
- Exercise 6.0 – Using USB Bootable Drive
- Types of Data
- Incident Response
- Hash Values
- Responding to Incidents
- Dates and Times
- Incident Response Plan
- Previewing Computer verses Forensic Image
Duration: 1 Day
Date: March 2, 2020
Time: 9.30 am. – 16.30 pm.
Venue: ACinfotec Training Center
16th Fl., Asia Centre Bldg., South Sathorn Rd.
Training Fees: 9,950 Baht (ex.vat7%)
Tel. 02 670 8980-3
Terms & Conditions for Course Registration
Please read the following terms & conditions for course registration carefully. Upon clicking submit button, it is demonstrated that I/We understand and accept the registration and cancellation policies and procedures.
- Full payment is required in advance prior to course commencement date.
- Payment is due upon registration
- Delegates who cancel after registration, or who don’t attend, are liable to pay the full course fee and no refunds can be given
- A replacement is always welcome
Disclaimer: ACinfotec reserves the right to change, postpone or cancel. Any part of its published programme due to unforeseen circumstances.