{"id":18,"date":"2012-06-07T03:53:29","date_gmt":"2012-06-07T03:53:29","guid":{"rendered":"http:\/\/112.109.118.49\/cdr\/wordpress\/?page_id=18"},"modified":"2012-06-07T14:51:44","modified_gmt":"2012-06-07T14:51:44","slug":"computer-forensics","status":"publish","type":"page","link":"https:\/\/cyberdefenseresearch.com\/?page_id=18","title":{"rendered":"Computer Forensics"},"content":{"rendered":"<p align=\"left\">This is one of the most popular courses in the industry today. Designed for the corporate environment, your entire IT department and technical support can receive extensive one or two week, on-site, hands-on, computer and digital forensics training course that includes more than 40 exercises in:<\/p>\n<ul>\n<li>\n<div align=\"left\">Setting up the forensics lab<\/div>\n<\/li>\n<li>\n<div align=\"left\">Hardware and computer forensics<\/div>\n<\/li>\n<li>\n<div align=\"left\">Software and computer forensics<\/div>\n<\/li>\n<li>\n<div align=\"left\">Operating systems and computer forensics<\/div>\n<\/li>\n<li>\n<div align=\"left\">Evidence handling<\/div>\n<\/li>\n<li>\n<div align=\"left\">Chain-of-custody<\/div>\n<\/li>\n<li>\n<div align=\"left\">Finding lost or hidden data<\/div>\n<\/li>\n<li>\n<div align=\"left\">Recovery of deleted and encrypted files<\/div>\n<\/li>\n<li>\n<div align=\"left\">Analysis of multiple digital forensic images for practice and development<\/div>\n<\/li>\n<li>\n<div align=\"left\">How to report your findings<\/div>\n<\/li>\n<li>\n<div align=\"left\">Steganography<\/div>\n<\/li>\n<li>\n<div align=\"left\">Detecting alternate data streams<\/div>\n<\/li>\n<li>\n<div align=\"left\">Recovering hidden files from CD&#8217;s<\/div>\n<\/li>\n<li>\n<div align=\"left\">Interviewing employees<\/div>\n<\/li>\n<li>\n<div align=\"left\">Corporate policies on expectation of privacy<\/div>\n<\/li>\n<li>\n<div align=\"left\">Interfacing with law enforcement<\/div>\n<\/li>\n<li>\n<div align=\"left\">Securing a crime scene and interfacing with law enforcement<\/div>\n<\/li>\n<li>\n<div align=\"left\">Basic legal, regulatory and civil issues relating to forensics discovery<\/div>\n<\/li>\n<li>\n<div align=\"left\">Cell phone recovery<\/div>\n<\/li>\n<li>\n<div align=\"left\">USB recovery<\/div>\n<\/li>\n<li>\n<div align=\"left\">Floppy and ZIP disk recovery<\/div>\n<\/li>\n<li>\n<div align=\"left\">Recovery, analysis and reporting<\/div>\n<\/li>\n<\/ul>\n<p align=\"left\">This training program uses Access Data FTK forensic recovery and analysis software and introduces the latest tools and techniques available in open source based computer forensics tools.<\/p>\n<p align=\"left\">Train your entire IT staff, on-site, for one unbelievably low price.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is one of the most popular courses in the industry today. Designed for the corporate environment, your entire IT department and technical support can receive extensive one or two week, on-site, hands-on, computer and digital forensics training course that &hellip; <a href=\"https:\/\/cyberdefenseresearch.com\/?page_id=18\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":28,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-18","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":0,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/28"}],"wp:attachment":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}