Cyber Forensics Workshop in Mumbai on 17th and 18th December 2016
₹1500-12500 INR
Закрито
Опублікований over 7 years ago
₹1500-12500 INR
Оплачується при отриманні
We are looking for a freelancer trainer in Mumbai who could deliver 2 days workshop on our behalf on cyber forensics.
Duration of the workshop will be 2 days / 16 hours, 7-8 hours per day.
Workshop Modules
Day 1 (First Day)
[login to view URL] of an Organization’s IT Environment
Concept of Zoning – Demilitarized Zone, Militarized Zone
Basic Servers being used in the IT Environment and their positioning in different Zones
Brief Insight of the IT Security Devices used
[login to view URL] is Computer Forensics all about?
Difference – Computer Crime & Un-authorized activities.
6 steps involved in Computer Forensics – Description of what is to be carried in each step
Need for forensics investigator
[login to view URL] Incident Response
What is a Security Incident
Role of the Investigator in investigating a Security Incident
Evidence Control and Documentation
Skills and Training of a Forensics Investigator – Technical, Presentation, Professional
[login to view URL] Regulation and Privacy Issues
Computer Abuse in the Corporate World
Security Policies
Security and Acceptable-Use Policies
[login to view URL] Control and Documentation
Document, Documents, Document.
Evidence Collection and Inventory
Chain of Custody
Evidence Storage and Security
6. Buiilldiing a Forensiics Laboratory
Laboratory Standards
Facility Physical Security
Evidence Security
Software
Hardware
Portable Forensics Labs
7. COMMERCIAL FORENSICS SOFTWARE TOOLS
The Case for Commercial Tools
Encase
Access Data Forensics Tool Kit
DriveSpy and Paraben
Day 2 (Second Day)
8. Open Source FORENSICS TOOLS
Windows Forensic Analysis Tools Open Source
Process Explorer from SysInternals
WhatsRunning
Registry Decoder CPORTS
Windows File Analyzer
Windows File Checksum Integrity Verifier
Registry Ripper
Microsoft Log Parser Tool
9. Open Source Diisk Imagiing Toolls
What is Disk Imaging
Utilities of Disk Imaging Disk Imaging Utilities
Access Data FTK Imager
DixmlSetup
10. File Analysis
What is File Analysis?
File Attributes
Unix File Permissions
Known File Type Signatures & Hashes
Malware Infected Files
Virus Characteristics
Indications of a Trojan Infection
Worms Windows File Analyzer- File Analysis Software
11. Log analysis
Why Log Analysis
Windows Log analysis
Tools for Log Analysis
OSSEC HIDS
Installation Logs
Windows Event Logs
UNIX Syslogs
Firewall and IDS/IPS Logs
Apache Access Logs & Error Logs
12. Windows Forensics
LIVE VS DEAD RESPONSES – WHEN AND WHY
NETWORK CONNECTIONS TCP-States
Demo-Whats Up Running Tool
Demo-Process Explorer Tool
Demo-CPorts
Windows Processes
[login to view URL]
Hidden Files
Concept of ADS (Alternate Data Stream)
Demo-Windows File Analyser Tool
AUDITING & THE SECURITY EVENT LOG
Demo- Windows File Checksum Integrity Verifier
Demo- Access Data Forensics Tool Kit
Create a Disk Image
13. Linux Forensics
Network connections,
Services
Logging and log files in UNIX
Linux forensics tools
Demo - Real Time Command Logging
Forensic Analysis using OSSEC HIDS
14. CONCLUDING THE INVESTIGATION
Documentation
Preparation
Concluding a Corporate Investigation
Testifying in Court
Ethical Responsibilities
Why Us?
Hi, I have been working as Computer Forensic Analyst more than 10 years. I became CCNP, RHCE 3 years back. Earlier I completed B.Sc. Enng and M.Sc. Engg both in computer engineering.
Hire Network professional not only writers. I'm both
Check my works here
https://www.freelancer.com/projects/Security-Forensics.html
https://www.freelancer.com/projects/Technical-Writing-Cisco/Design-Computer-Network.html
https://www.freelancer.com/projects/Social-Networking-Cisco/Design-OPNET.5744653.html
https://www.freelancer.com/projects/Web-Security-Computer-Security/Web-Security.5469931.html
I'm assuring you the best quality.
I'm looking forward to hearing from you very soon