NetSecurity NetSecurity Forensic Labs Hands-On How-To Security Training
Training Courses On-Site Training Registration Forensic Labs Company
Network &asp; Application Security, Computer Forensics, Incident Response, Network Forensics, Malware Analysis, Memory Forensics, Malicious Document Analysis
Hands-On How-To® Training > Courses >
Computer Forensics Training for Attorneys (CLE)

Syllabus: Detailed syllabus is available.

Course Overview:

Digital information continues to grow at an exponential rate. Data is no longer stored solely in computer hard drives, backup tapes, or compact discs (CDs). With the growth of emerging portable data and storage devices, such as portable digital assistants (PDAs), cell phones, and Blackberry devices, crucial information can be anywhere and easily passed from device-to-device. Information stored in these changing media can be crucial sources of evidence in corporate, civil, and criminal investigations.

Moreover, cyber criminals are continuously crafting ways to evade existing forensics tools and techniques. NetSecurity's Computer Forensics Training for Attorneys course teaches legal professionals the process of locating, acquiring, preserving, analyzing, and producing solid digital evidence that can make the difference between winning and losing a case. The Hands-On How-To Lab Exercises (HOHTLEs) covered in the course incorporate significant real-world experiences necessary to prepare or scrutinize a forensics investigator.

NetSecurity Benefits:

Through years of real-world hands-on security and forensics experience, NetSecurity has supported Fortune 500 companies, law firms, and federal agencies — such as the IRS, DHS, VA, BBG, DOL, NSF, and DoD. The benefits of our Computer Forensics Training for Attorneys include:

  • Customized private sessions, tailored towards your unique requirements
  • Instructor-led and student-performed hands-on exercises
  • Seasoned security and forensics experts with
    • Real-world hands-on consulting and training experience
    • Media publication and industry speaking experience
  • Arsenal of take-aways (guides and relevant forensics resources)
  • Up-to-date course content, addressing emerging forensics topics
  • Small class sizes ensuring maximum student-instructor interaction
  • Vendor-neutral content

Target Audience:

T he course is targeted towards technical professionals, including:

  • Cyber Crime Attorneys
  • Paralegal Professionals
  • Magistrates/Judges
  • Private investigators
  • Compliance Officers

Course Format:

  • Interactive presentations by forensics expert
  • Hands-On How-To Lab Exercises (HOHTLEs) in performing computer forensics

Course Duration: Two (2) Days

Course Cost: CALL

Course Objectives:

Upon successful completion of the Computer Forensics Training for Attorneys course, each participant will be armed with the required knowledge to understand and analyze computer evidence that can withstand legal scrutiny. Attendees will also learn to dissect evidence produced by opposing counsel. Specifically, attendees will possess relevant knowledge in:

  • Tried and proven forensics investigation processes
  • Evidence authentication, handling, preservation, and security
  • Common mistakes to avoid in an investigation
  • Preparing your own experts and scrutinizing those of opposing expert teams
  • Getting an organization ready for forensics investigations and e-discovery

Course Topics:

NetSecurity’s Computer Forensics Training for Attorneys course includes coverage of real-world scenarios and HOHTLEs in the following areas:

Topics Discussion and HOHTLEs
  • Computer Overview
  • Computer Fundamentals
  • Computer Storage Media
  • Mobile Storage Devices
  • Computer Networks
  • Computer Hacking Overview
  • Forensics Overview
  • Computer Forensics Fundamentals
  • Benefits of Computer Forensics
  • Computer Crimes
  • Computer Forensics Evidence and the Courts
  • Legal Concerns and Privacy Issues
  • Forensics Process
  • Forensics Investigation Process
  • Securing the Evidence and Crime Scene
  • Chain of Custody
  • Law Enforcement Methodologies
  • Forensics Evidence
  • Evidence Sources
  • Evidence Duplication, Preservation, Handling, and Security
  • Forensics Soundness
  • Order of Volatility of Evidence
  • Collection of Evidence on a Live System
  • Court Admissibility of Volatile Evidence
  • Forensics Readiness
  • Benefits of Forensic Readiness
  • Preparing an Organization for Forensics Investigations
  • Managing an Investigation
  • Forensics Lab
  • Benefits of a Computer Forensics Lab
  • Forensics Lab Requirements
  • Securing the Forensics Lab
  • Acquisition and Duplication
  • Sterilizing Evidence Media
  • Acquiring Forensics Images
  • Acquiring Live Volatile Data
  • Data Analysis
  • Metadata Extraction
  • File System Analysis
  • Performing Searches
  • Recovering Deleted, Encrypted, and Hidden files
  • Internet Forensics
  • Reconstructing Past Internet Activities and Events
  • E-mail Analysis
  • Messenger Analysis: AOL, Yahoo, MSN, and Chats
  • Mobile Device Forensics
  • Evidence in Cell Phone, PDA, Blackberry, iPhone, iPod, iPad, Android, and MP3
  • Evidence in CD, DVD, Tape Drive, USB, Flash Memory, Digital Camera
  • Evidence in other emerging mobile devices
  • Court Testimony
  • Testifying in Court
  • Expert Witness Testimony
  • Evidence Admissibility
  • E-Discovery
  • Federal Rules of Civil Procedure (FRCP)
  • Collection and Preservation of Electronically Stored Information
  • Legal and IT Requirements
  • Developing Computer Investigation and E-Discovery Capabilities

Detailed syllabus is available.

Course Schedule and Registration:

Course schedule and registration information is available here.







certification training