Self-Study
12
Basic
Specialized Knowledge
There are no prerequisites.

Choose a format

Hard Copy

$189

Online Access

$159


Course Description

Applicable to all work environments, cyber investigation scenarios, and technologies, this course addresses the fundamental concepts found in the rapidly evolving field of cyber forensics. The materials explain the basic principles of data as building blocks of electronic evidential matter used in cyber forensics investigations. The text is written in a step-by-step manner, beginning with the elementary building blocks of data, and progressing upwards to the representation and storage of information. Practical examples and illustrations will guide you through the course.



Instructors

Albert Marcella, Jr.

Albert Marcella is the president of Business Automation Consultants, LLC, a global information technology and management consulting firm providing IT management consulting, audit and security reviews, and training. He’s an internationally recognized public speaker, researcher, workshop and seminar leader, and the author of numerous articles and books on subjects related to IT, audit, and security.

Frederic Guillossou

Frederic Guillossou, CISSP, CCE, is an Information Security Analyst with TALX, a division of Equifax. He regularly trains on intrusion prevention systems and has successfully led a number of forensic investigations in the field.



Course Specifics

Specialized Knowledge
Feb 15, 2018
There are no prerequisites.
SS9169001
415
None


Compliance Information

103220
Qualifies for CA Fraud: No


Learning Objectives

Upon successful completion of this course, participants will be able to:

Chapter 1

  • Recognize the evolution of computational communication systems, the role of a binary numbering system, and the basics of the character codes of ASCII and Unicode

Chapter 2

  • Recognize how to convert a binary number into its decimal equivalent, noting why this knowledge is essential for gaining a greater depth of understanding of how data is stored, moved, manipulated, and processed

Chapter 3

  • Recognize the components of the Hexadecimal format (HEX) used to represent binary values

Chapter 4

  • Identify file structures, formats, and signatures, noting their roles and relevancy in cyber forensic investigations

Chapter 5

  • Identify the elements and functions of the boot process, including the Master Boot Record (MBR) and the Basic Input Output System (BIOS)
  • Recognize different file systems and their relationship and relevance to cyber forensics

Chapter 6

  • Recognize the concept of endianness, the attribute of a system that indicates whether integers are represented from left to right or right to left

Chapter 7

  • Recognize the attributes of volume versus partition, noting mounting the file system, logical block addresses, and the storage and representation of data and its importance to the cyber forensic investigation process

Chapter 8

  • Identify the components of FAT 12/16 file systems and the 'mounting' of data into identifiable information

Chapter 9

  • Identify the attributes of file systems beyond FAT, including the New Technology File System (NTFS)

Chapter 10

  • Identify cyber forensic investigative smart practices, noting the forensic process and the applicable steps in the investigative process

Chapter 11

  • Cite the sequencing of events and protocols necessary to cyber forensic investigations

Chapter 12

  • Identify forensic investigative smart practices for incident closure, noting the steps and protocols for communicating findings, reporting, retention and curation of evidence, investigation wrap-up, and the investigator's role as an expert witness

Chapter 13

  • List the components and steps in the cyber forensic investigation process


Choose Your Preferred Format


Online Access

Get immediate access to a robust collection of learning and reference materials, allowing you to dive deep into the information you need. Our self-study materials are authored by top-quality, industry experts who focus on helping you grasp concepts quickly using real-life examples. Download your CPE to any device, and take it with you so you can learn when and wherever you want. Complete your CPE with an online exam, and enjoy instant grading with the option to print your certificate immediately upon passing.

online access
Hard Copy

Our self-study materials are authored by top-quality, industry experts. You’ll receive a bound notebook of all the course materials, shipped to you within one business day. In addition, you’ll also have full online access. Each self-study package includes a robust collection of learning and reference materials to help you cover the information efficiently and put it into practice immediately.

hard copy
Self-Study Video

Experience high-quality instruction with our Self-Study Videos, available to you 24/7. With more than 80+ videos currently in the Western CPE Self-Study Video library, you can see and hear our expert instructors deliver the information you need in a dynamic way that allows you to immediately apply your learning. Unlike a live course or webcast, you can complete the course on your own time, playing and pausing as needed. Self-Study Videos allow you to complete your CPE requirements on your own time.

hard copy


Back to top