Thursday, August 23, 2012

SANS Security SEC408 Essentials Toolkit (SIFT) ? CrDD

SANS Security SEC408 Essentials Toolkit (SIFT)

Size: 6.52Gb

Genre: Security-training, E-Learning

You will receive with this course: Free SANS Investigative Forensic Toolkit (SIFT) Essentials.

As a part of this course you will receive a SANS Investigative Forensic Toolkit (SIFT) Essentials with a Tableau Write Block Acquisition Kit. The entire kit will enable each investigator to accomplish proper and secure examinations of SATA, IDE, or Solid State Drives (SSD).

The toolkit consists of:

Forensics SIFT Tableau T35es Write Blocker Kit

Tableau T35es Write Blocker Kit

One Tableau T35es Write Blocker (Read-Only)

IDE Cable/Adapters

SATA Cable/Adapters

FireWire, and USB Cable Adapters

Forensic Notebook Adapters (IDE/SATA)

Forensics SIFT Tableau

SANS VMware-Based Forensic Analysis VMware Workstation

Fully functioning tools that include working with Access Data's Forensic Toolkit (FTK) , and Guidance Software's EnCase

Course DVD: Loaded with case examples, tools, and documentation

Who should attend

Information technology professionals who wish to learn the core concepts in computer forensics investigations

Incident Response Team Members who are new to responding to security incidents, and need to utilize computer forensics to help solve their cases

Law enforcement officers, federal agents, or detectives who desire to become a subject matter expert on computer forensics for Windows based operating systems

Media Exploitation Analysts who need to master Tactical Exploitation and Document and Media Exploitation (DOMEX) operations on systems used by an individual. They will be able to specifically determine how the individual used their system, who they communicated with, and files they have downloaded, edited, or deleted.

Information security managers who need to understand digital forensics in order to understand information security implications, and potential litigation related issues or manage investigative teams

Information technology lawyers, and paralegals who desire to have a formal education in digital forensic investigations

Anyone interested in computer forensic investigations with a background in information systems, information security, and computers

Computer Forensic Investigations - Windows In-Depth course topics

Registry Forensics

Evidence Integrity

Law Enforcement Bag, and Tag

Evidence Acquisition Tools, and Techniques

Windows File System Basics

Windows Artifact Analysis

Prefetch Analysis

File, and Picture Metadata Tracking, and Examination

Windows Recycle Bin Analysis

Windows Link File Investigation

Microsoft Office Document Analysis

E-mail Forensics (Host, Server, Web)

Facebook, Gmail, Hotmail, Yahoo Chat and Webmail Analysis

Examine cases involving Windows Xp, VISTA, and Windows 7

String Searching, and Data Carving

Deleted File Recovery

Firefox, and Internet Explorer Browser Forensics

Event Log File Analysis

Media Analysis And Exploitation Involving:

Recover, and examine browser artifacts even those used in private browsing mode

Show how the suspect logged into the machine via the console, RDP, or network

USB device tracking, and analysis

Show the exact physical location of the system

Determine if a suspect had knowledge of a specific file

Show when any file was first, and last opened by a suspect

Determine the exact time, and the number of times a suspect executed a program

Tell if, and how the suspect downloaded a specific file to the PC

Tracking user communications using a windows Pc (email, chat, IM, webmail)

Fully Updated to include full Windows 7, and Server 2008 Examinations

Certifications

FOR408 - Computer Forensic Investigations - Windows In-Depth is an Authorized Training Center for the following Digital Forensic Certifications:

GIAC Certified Forensic Examiner (GCFE)

ISFCE Certified Computer Examiner (CCE) ISFCE Certified Computer Examiner (CCE)

For USA, EU, Japan, Sing, Au, Ru, UAE, GE, CA, SA.

Mirror For Japan, EU, UAE, China, Au, Ru, SA, Brazil and Sing...



Source: http://crdd.org/ebooks/526837-sans-security-sec408-essentials-toolkit-sift.html

kim jong ill dead wedding crashers next iron chef next iron chef aquamarine iraq war iraq war

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.