SANS Security SEC408 Essentials Toolkit (SIFT)
Size: 6.52Gb
Genre: Security-training, E-Learning
You will receive with this course: Free SANS Investigative Forensic Toolkit (SIFT) Essentials.
As a part of this course you will receive a SANS Investigative Forensic Toolkit (SIFT) Essentials with a Tableau Write Block Acquisition Kit. The entire kit will enable each investigator to accomplish proper and secure examinations of SATA, IDE, or Solid State Drives (SSD).
The toolkit consists of:
Forensics SIFT Tableau T35es Write Blocker Kit
Tableau T35es Write Blocker Kit
One Tableau T35es Write Blocker (Read-Only)
IDE Cable/Adapters
SATA Cable/Adapters
FireWire, and USB Cable Adapters
Forensic Notebook Adapters (IDE/SATA)
Forensics SIFT Tableau
SANS VMware-Based Forensic Analysis VMware Workstation
Fully functioning tools that include working with Access Data's Forensic Toolkit (FTK) , and Guidance Software's EnCase
Course DVD: Loaded with case examples, tools, and documentation
Who should attend
Information technology professionals who wish to learn the core concepts in computer forensics investigations
Incident Response Team Members who are new to responding to security incidents, and need to utilize computer forensics to help solve their cases
Law enforcement officers, federal agents, or detectives who desire to become a subject matter expert on computer forensics for Windows based operating systems
Media Exploitation Analysts who need to master Tactical Exploitation and Document and Media Exploitation (DOMEX) operations on systems used by an individual. They will be able to specifically determine how the individual used their system, who they communicated with, and files they have downloaded, edited, or deleted.
Information security managers who need to understand digital forensics in order to understand information security implications, and potential litigation related issues or manage investigative teams
Information technology lawyers, and paralegals who desire to have a formal education in digital forensic investigations
Anyone interested in computer forensic investigations with a background in information systems, information security, and computers
Computer Forensic Investigations - Windows In-Depth course topics
Registry Forensics
Evidence Integrity
Law Enforcement Bag, and Tag
Evidence Acquisition Tools, and Techniques
Windows File System Basics
Windows Artifact Analysis
Prefetch Analysis
File, and Picture Metadata Tracking, and Examination
Windows Recycle Bin Analysis
Windows Link File Investigation
Microsoft Office Document Analysis
E-mail Forensics (Host, Server, Web)
Facebook, Gmail, Hotmail, Yahoo Chat and Webmail Analysis
Examine cases involving Windows Xp, VISTA, and Windows 7
String Searching, and Data Carving
Deleted File Recovery
Firefox, and Internet Explorer Browser Forensics
Event Log File Analysis
Media Analysis And Exploitation Involving:
Recover, and examine browser artifacts even those used in private browsing mode
Show how the suspect logged into the machine via the console, RDP, or network
USB device tracking, and analysis
Show the exact physical location of the system
Determine if a suspect had knowledge of a specific file
Show when any file was first, and last opened by a suspect
Determine the exact time, and the number of times a suspect executed a program
Tell if, and how the suspect downloaded a specific file to the PC
Tracking user communications using a windows Pc (email, chat, IM, webmail)
Fully Updated to include full Windows 7, and Server 2008 Examinations
Certifications
FOR408 - Computer Forensic Investigations - Windows In-Depth is an Authorized Training Center for the following Digital Forensic Certifications:
GIAC Certified Forensic Examiner (GCFE)
ISFCE Certified Computer Examiner (CCE) ISFCE Certified Computer Examiner (CCE)
For USA, EU, Japan, Sing, Au, Ru, UAE, GE, CA, SA.
Mirror For Japan, EU, UAE, China, Au, Ru, SA, Brazil and Sing...
Source: http://crdd.org/ebooks/526837-sans-security-sec408-essentials-toolkit-sift.html
kim jong ill dead wedding crashers next iron chef next iron chef aquamarine iraq war iraq war
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.