Computer Forensics Training
Learn about computer forensic tools and diagnostic techniques while gathering evidence. Includes instructor support, online exams and a certificate of completion.
Computer Forensics Training
Master the techniques for gathering electronic evidence and explore the new frontier of crime investigation.
Introduction to Computer Forensics is a distance learning course that will enable you to learn these topics quickly without disrupting your present lifestyle!
Learn from the comfort of your own home and study when it's convenient for you - there are no time limits. Take your exams online and finish with an academic Certificate of Completion from CIE Bookstore.
The demand for computer forensics experts greatly exceeds the supply. With the rapid growth of technology in all parts of our lives, criminal activity must be tracked down and investigated using electronic methods that require up-to-date techniques and knowledge of the latest software tools.
This distance learning course will give you the legal, technical and investigative skills you need to launch your career in computer forensics. You can also use this course to help you advance in careers such as criminal justice, accounting, law enforcement and federal investigation!
Learn how to:
- Use the correct investigative tools and procedures to
maximize effectiveness of evidence gathering.
- Keep evidence in pristine condition so it will be admissible in
a legal action.
- Investigate large scale attacks such as identity theft, fraud,
phishing, extortion and malware infections.
- Become proficient with the legal foundations for proper
handling of traditional and electronic evidence.
- Use practical tools such as FTK, EnCase, Passware,
Ethereal, LADS, WinHex, GIMP, Camouflage and Snort.
This course was designed with a convenient step-by-step learning format that will allow you to master new topics quickly and effectively. If you ever need help with your course you can call or e-mail our staff of highly trained instructors for immediate attention or you can join the chat room and ask a question.
Computer Forensics Training Lessons:
This course consists of thirteen lesson assignments and two projects.
1. Forensic Evidence and Crime Investigation
Students learn what is a crime, the different types of evidence, the increasing importance of electronic evidence, how to identify what computer forensics tools and techniques can reveal and recover, the difference between the process of discovery and electronic discovery.
2. Computer Forensics and Digital Detective Work
Students learn the generally accepted computer forensics methods and the technical, legal and ethical environment in which the computer forensics investigator operates.
3. Tools, Environments, Equipment and Certifications
Students learn how to manage a computer forensics case, authenticate evidence and search/analyze data. It covers what forensic toolkits, equipment and specialized environments are needed to preserve evidence when it is being handled and transported. Professional certification and training issues are also covered.
4. Policies and Procedures
This lesson takes you step-by-step through the actual process of conducting a forensic examination from teh first phone call to turning over the final project.
5. Data, PDA and Cell Forensics
Students learn about the state of the art tools and techniques for extracting evidence from the wide variety of media storage devices in use today. Some of the most common types of devices include disk drives, cell phones, and PDAs. The importance of acquiring evidence without altering of tainting it is streesed.
6. Operating Systems and Data Transmission Basics for Digital Investigations
Learn what the forensics investigator needs to know about the latest operating system functions in use today and discover the data networking as embodied in the OSI model and its TCP implementation.
7. Project #1
Case study report.
8. Investigating Windows, Linux and Graphic Files
Learn tips and strategies for uncovering forensic data within the Windows and Linux file systems. Recover data from graphic file formats and see where hiding data within a file is possible. Gain knowledge of the tools needed to complete these tasks.
9. E-mail and Webmail Forensics
Examine e-mail and other popular electronic text communication as a rich source of forensic data.
10. Internet and Network Forensics and Intrusion Detection
Students learn about network forensics. Intrusion detection systems (IDS)and network forensic analysis toolkits (NFATS) are introduced.
11. Tracking down those who intend to do harm on a large scale
Investigating terrorists, cyberextortionists, hackers and botmasters. Examine the motives and methods of the perpetrators of large-scale computer crime.
12. Fraud and Forensic Accounting Investigation
Learn forensic techniques to investigate and prosecute accounting fruad and other white collar crimes.
13. Federal Rules and Criminal Codes
Learn some of the major crime laws of the United States and the rules of procedure and evidence under which defendants are prosecuted.
14. Ethical and Professional Responsibility in Testimony
The importance of a defensible approach to data collection and data preservation is stressed, along with scrupulous attention to chain of custody issues and rules of evidence.
15. Project #2
Case study report.
Student Evaluation and Grading Method:
Each of the 13 assignments/lessons culminates with an examination comprising of multiple-choice questions and matching questions. The 2 projects are case studies that require written responses. The lesson examinations are open book.
Everything you need to graduate is sent to your home and you can take your exams online. Best of all, you’ll earn an impressive Certificate of Completion suitable for framing when you're finished!
1. Instructor Assistance:
Use our toll-free Instructor Hot-line, direct e-mail or chat room to access our faculty and staff if you ever need assistance with your course work. CIE's dedicated staff of instructors do more than just grade your exams; they help guide you, step-by-step, through your studies and hands-on training.
They'll encourage you when you're doing well and give you support when you need it. Most importantly they'll see that every question you have receives careful consideration by one or more members of the staff.
You can be sure the response, whether it's a simple explanation or an in-depth theoretical discussion, will be prompt, courteous and thorough. We'll make sure that you'll never study alone.
2. Priority Grading - No waiting
Your submitted exams will be graded and sent back to you within 24 hours. You can be sure that you will get back almost instantaneous feedback from your exams. Take your exams online on our e-grade web site or mail them in to us.
3. Professional Certificate of Completion from CIE Bookstore
After finishing this course you'll receive a certificate of completion suitable for framing!
How do I enroll in the Computer Forensics Training Course?
1. You can order online with a credit card or PayPal (click the 'Add to Cart' button).
2. Call us at (800) 321-2155 and ask for course 01-CET430.
3. You can mail a check or money order for $247.95
(includes $22.95 for shipping/handling) to:
1776 E. 17th Street
Cleveland, Ohio 44114
Attn: Computer Forensics Training
4. You can fax your order to us at 216-781-0331.
Foreign shipping expense will be higher.
Start your Computer Forensics Training today!