Digital Forensics Certified Forensic Investigation Practitioner (CFIP)

Provided by

Enquire about this course

About the course

Digital Forensics
Certified Forensic Investigation Practitioner (CFIP)

Core - level course
This core-level technical course is designed for people looking to develop their computer forensics investigation skills, either for a career in digital investigations or as part of their current cyber role.

How will I benefit?
The course will give you:

  • An understanding of each stage of a forensic investigation, from evidence seizure through to data investigation and interpretation, to report and presentation of findings
  • The skills to allow you to undertake the forensic acquisition of an electronic device
  • Confidence in working with key forensic investigation products
  • An industry-recognised qualification in forensic investigation and ideal preparation for the 7Safe CFIS advanced course


"The instructor demonstrated a breadth of intricate knowledge that was impressive, modest and at all times available to the class. There were a wide range of candidate histories and he managed these with ease; whilst not disadvantaging anyone. I was particularly impressed with his depth of knowledge and ability to add real-world context to the skills he was teaching; something other companies in my experience are unable to offer to this standard."

Director - Intelligence and Information
City of London Police

"An excellent instructor who has a fantastic knowledge of the Digital Forensic field. He explained everything simply and clearly and produced excellent resources for us to follow during the course. Would recommend highly."

CFIP delegate

"An excellent course with a very knowledgeable trainer. Practical sessions were very useful."

CFIP delegate, British Transport Police


For more information about this course, please see below
 

What will I learn?

  • You will learn the principles and guidelines for static computer forensic investigations; the fundamentals of the complete forensic investigation process; how to preserve evidence and the methodology for conducting a forensic investigation
  • You will use practical, hands-on exercises to help you understand how data is stored on electronic media, how to work with key forensic investigation tools and how to identify Windows-based OS forensic artefacts


Who should attend?
Anyone who is or wants to be responsible for computer forensic investigations, including:

  • Cyber forensic and network investigators
  • IT security officers
  • Law enforcement officials

This core-level technical course is designed for people looking
to develop their computer forensics investigation skills, either for a career in digital investigations or as part of their current cyber role.

COURSE OVERVIEW
Gain an understanding of digital forensics analysis by learning
about forensic principles, evidence continuity and methodology to employ
when conducting a digital forensic investigation. This five-day course will provide you with a practical base understanding of the legalities, best practice and methodologies used in the current digital
forensic investigation environment. The course content covers seizure, evidence handling and data preservation, through to investigation and interpretation, and finally the reporting and presentation of findings.

THE SKILLS YOU WILL LEARN
Using practical scenarios based on Windows 7 artefacts with the latest disk technologies, you will learn the following:

  • The principles and guidelines for static digital forensic investigations
  • The process of evidence continuity
  • The fundamentals of the complete forensic investigation process
  • The forensic acquisition of an electronic device
  •  How data is stored on electronic media
  • How to work with key forensic investigation products
  • How to identify Windows based OS forensic artefacts
  • The course will also provide answers to many questions including:
  • What skills and qualifications do I need to practice digital forensics?
  • How and where is data actually stored on a device?
  • What is the difference between forensic imaging and cloning?
  • Is keyword searching an effective way to identify data on a device?
  • What is hashing and how can it be used in digital forensics?
  • What happens when a user deletes a file or empties a recycle bin?
  • How does ‘Private’ web-browsing work?
  • Can data be recovered after 7 pass overwrite?
  • Is there a backdoor to passwords and encryption?
  • Who was using a computer on a particular occasion?
  • How can I identify if and when a user edited or accessed a file?

KEY BENEFITS
The course will give you:

  • An understanding of each stage of a forensic investigation, from evidence seizure through to data investigation and interpretation, to report and presentation of findings
  • The skills to allow you to undertake the forensic acquisition of an electronic device
  • Confidence in working with key forensic investigation products
  • An industry-recognised qualification in forensic investigation and ideal preparation for the 7Safe CFIS advanced course

WHO SHOULD ATTEND
Those responsible or eager to become responsible for computer
forensic investigations, including:

  • Cyber Forensic & Network Investigators
  • IT Security Officers
  • Law Enforcement Officials

PREREQUISITES
Experience with Microsoft Windows OS and, ideally, a general appreciation of forensic principles, practices and software.

WHAT QUALIFICATION
WILL I RECEIVE?

Those delegates successfully passing the exam at the end of
the course will be awarded 7Safe’s Certified Forensic Investigation
Practitioner (CFIP) qualification.

Syllabus

1. Introduction to Digital Forensics
2. Investigation Guidelines and
Process
3. Identification & Seizure
a. Forensic Acquisition
4. Understanding Electronic Data
a. Understand how data is stored
on electronic devices
b. Analyse the functionality of
a computer file system
5. Physical and Logical Disks
6. File Systems and Data Storage
7. Dates, Times and Metadata
8. Forensic Analysis Techniques
9. Windows Artefacts
a. Function, structure and
operation of the Windows
registry
b. Internet history
c. Recycle bins
10. Forensic Challenges
11. Reporting
a. Collating results
b. Contents and layout of forensic
reports
12. Electronic data
a. Hardware and Software
b. Addressing hardware employed
during a forensic investigation
c. Familiarisation with forensic
software
13. Investigating Windows artefacts
14. Reporting

 

 

Enquire

Start date Location / delivery
25 Nov 2019 Cambridge
30 Nov 2019 Cambridge
03 Feb 2020 Cambridge
27 Apr 2020 Cambridge
27 Jul 2020 Cambridge

Related article

Cyber security – why bother? Most people’s perception of cyber-attacks are either of someone in a darkened room trying to take down web sites, or c...