Learn how to investigate cybercrime! This boot camp goes in-depth into the tools, techniques and processes used by forensics examiners to find and extract evidence from computers.
Infosec’s Computer Forensics Boot Camp teaches you how to identify, preserve, extract, analyze, and report forensic evidence on computers. You will learn about the challenges of computer forensics, walk through the process of analysis and examination of operating systems, and gain a deep understanding of differences in evidence locations and examination techniques on Windows and Linux computers.
More than 30 hands-on labs simulating a real cybercrime investigation provide you with practical experience using commercial and open- source forensic tools. The boot camp also prepares you to become a Certified Computer Forensics Examiner (CCFE).
Students must have no criminal record. Basic computer skills, including the ability or desire to work outside the Windows GUI interface, are necessary. A+ certification and/or similar training and experience is not required, but recommended.
This is a very in-depth training course and is not intended for individuals who have limited or no computer skills.
- Law enforcement professionals looking to expand into computer crime investigations
- Legal professionals
- IT and information security professionals being tasked with corporate forensics and incident handling
- Anyone with a desire to learn about computer forensics and develop their skills
Computer Forensics Boot Camp Training Delivery Methods
- Official InfoSec course curriculum
- 30+ hands-on labs included
- After-course instructor coaching included
- Exam voucher included
Computer Forensics Boot Camp Training Course Benefits
Understand provisions of IT lawUnderstand complex technical forensics conceptsHow to apply forensics concepts to forensic investigationsHandle evidence (procedures and rules)Use a range of computer forensics toolsAcquire forensic evidenceLocate forensic artifacts in various operating systemsAnalyze extracted evidence » Properly reporting findingsTrack an offender on the internetWork with law enforcementDesign an incident response strategy
Computer Forensics Training Outline