spacer
 
Call toll free 1(866)471-0059
    Call direct +1-708-689-0131
What‘s New   About InfoSec   Course Catalog   Contact Us
spacer
 
spacer
spacer
spacer
spacer
spacer
spacer
spacer Small Class Size
spacer Hands On Security Training
spacer Cutting-Edge Course Content
spacer Satisfaction Guarantee
spacer World Renown Instructors
spacer Boot Camp Style Training
spacer Luxury Accommodations
 
Enterprise Security Awareness:
spacer Security Awareness for IT Users
spacer Security Awareness for PCI DSS
spacer Security Awareness for IT Pros
spacer Security Awareness for Software Developers
Hands-On Security Training:
spacer Ethical Hacking
spacer Advanced Ethical Hacking
spacer Penetration Testing - 10 Day
spacer Expert Penetration Testing
spacer Intrusion Prevention
spacer Computer Forensics Training
spacer Advanced Computer Forensics
spacer Data Recovery Training
spacer Forensics & Data Recovery - 10 Day
spacer Security Architecture Design
spacer Application Security
spacer SCADA Security
spacer Reverse Engineering Training
spacer Advanced Reverse Engineering Malware
spacer Information Security Training
spacer DIACAP Training
spacer Incident Response and Network Forensics
spacer VOIP Security Course
spacer Wireless Security Training
spacer On-Site Training
Certification Preparation Training:
spacer CEH Boot Camp
spacer CISSP Boot Camp
spacer CISA Boot Camp
spacer CISM Boot Camp
spacer ECSA/LPT Boot Camp
spacer Security+ Boot Camp
spacer On-Site Training
Online Professional Development:
spacer Hacker Training Online
spacer Advanced Hacking Online
spacer Penetration Testing Online
spacer Intrusion Prevention Online
spacer Reverse Engineering Online
spacer Computer Forensics Training
spacer SCADA Security Online
spacer Data Recovery Online
spacer Security Architecture Online
spacer Application Security Online
spacer CISSP Boot Camp Online
spacer CISM Boot Camp Online
spacer CISA Boot Camp Online
spacer
Small Class Size spacer
spacer
spacer
Bring a Friend Discount spacer
spacer
spacer
Hands-On Instruction spacer
spacer
spacer
World Renown Instructors spacer
spacer
spacer spacer spacer
   
spacer spacer spacer
 
spacer spacer
Computer Forensics Training

InfoSec Institute: Information Security Training

Computer crimes happen! Did you know that evidence can be found on freshly formatted hard drives, cell phones, and even digital cameras?

The rate of fraud, abuse and downright criminal activity on IT systems by hackers, contractors and even employees are reaching alarming rates. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics duties on their jobs. In terms of job growth, nothing beats computer forensics as a career, and no one can beat InfoSec Institute as the best place to learn from a computer forensics training expert.

...........................................spacer ...........................................

Computer Forensics Training Program Details :

spacer

InfoSec Institute Computer Forensics featured in NASPA

Computer crime is here to stay. Computer Forensics Specialists are needed by today's companies to determine the root cause of a hacker attack, collect evidence legally admissible in court, and protect corporate assets and reputation. The best way to become a forensics expert is to attend a training session with a computer forensics training expert.

During InfoSec Institute's Computer Forensics Training course you will:

  • See the dark side of how computer crimes are committed.
  • Learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques.
  • Learn how to recover data intentionally hidden or encrypted by perpetrators.

You will also learn how to create an effective computer crime policy, and gain the hands on skills to implement it.

After attending Computer Forensics Training, you will leave with a custom computer forensics toolkit that will enable you to perform a legally admissible forensics investigation and the skills to run the investigation properly.

This hands-on computer forensics training offers practical experience in a wide array of computer forensics situations that are applicable to the real world. Learn everything relating to computer forensics --- from how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media.

Course Includes License of AccessData's FTK 2.0:
Real world computer forensics requires the use of a powerful enterprise forensics tool. AccessData's FTK suite is the premier software package for computer forensic analysis. All InfoSec Institute students have the option of including FTK 2.0 with their student registration after 1/1/2008. Contact us for more details about this program.

Total Access to Live Recorded Computer Forensics Lectures:
InfoSec Institute's Computer Forensics class is structured for maximum retention of knowledge learned in class. Because we believe in a commitment to your ongoing education after you attend a hands-on Computer Forensics class, InfoSec Institute makes available for every student access to all of the Live Recorded lectures you attended in-class. These are available in online format for 30 days after the training session!

...........................................spacer ..........................................

Prepare Yourself For Up To 3 Computer Forensics Certifications:
This Computer Forensics training course prepares you for up to 3 industry recognized computer forensics certifications. As a vendor neutral training provider, InfoSec Institute has recognized that spacer many students require more than one computer forensics certification. During the training class, you will be prepared to take:

  • IACRB's Certified Computer For
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.