CIDF
Our digital forensics professionals will in this lab-based training provide practical case study scenarios, best practices, tools, and standard digital forensic techniques to gather digital evidence to ensure forensically ready IT environments.
- 4 month / Physical / Online
- Intakes: Jan, Apr, Jun, Oct
Overview
The need for IT professionals to investigate incidents of cyber-breaches promptly and use the right digital forensic procedures has become central given recent global cyber-attack trends. Analysis done through investigations conducted has revealed the challenges IT professionals face in responding to and managing incidents within complex IT environments, especially with complex enterprise systems, integration of third-party applications, cloud computing, mobile devices, and recently with work-from-home regimes which has increased the exposure of IT environments to cyber-attacks.
Our digital forensics professionals will in this lab-based training provide practical case study scenarios, best practices, tools, and standard digital forensic techniques to gather digital evidence to ensure forensically ready IT environments.
Program Learning Outcomes
Demonstrate an understanding of how communication shapes patterns of social interaction, the expression of cultural values and norms, political practices and relations of power, and our positions as local and global citizens.
Be able to use a variety of methodological tools to analyze interpersonal data, and rhetorical discourse that structures everyday interactions in both our public and private lives.
Demonstrate an understanding of the possibilities, problems, and history of discourse and deliberation in democracy and will be prepared to use their knowledge to work for a just and more humane world.
Course Content
• Intelligence gathering
• Surveillance
• Reconnaissance (RECCE)
• Digital Examination Processes, Tools & Techniques
• Critical Observation Techniques
• Investigations Techniques
• Fraud Prevention and Investigations
• Data Mining on Digital Devices
• Developing Leads in Contact Tracing
• Report Writing
• Cyber/Digital Forensics
• Cyber fraud investigations
• Data mining and analysis
• Cyber Crime (Card Fraud)
• The Use of Informants
• Environmental Security Threats
• Extracting & Analysing user Generated Activities (Web browser Analysis & Web Attacks, Emails, USB Activities, etc)
• Social Media Analysis
• Criminal Law
• Digital Examination Processes, Tools & Techniques
• Case Study
Contact us
- You Apply
Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.
- We Connect
After you submit your application, an admissions representative will contact you and will help you to complete the process.
- You Get Ready
Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.