
QAS Self-Study

Basic

CPE Credits
12 Credits: Specialized Knowledge
Course Description
Applicable to all work environments, cyber investigation scenarios, and technologies, this course addresses the fundamental concepts found in the rapidly evolving field of cyber forensics. The materials explain the basic principles of data as building blocks of electronic evidential matter used in cyber forensics investigations. The text is written in a step-by-step manner, beginning with the elementary building blocks of data, and progressing upwards to the representation and storage of information. Practical examples and illustrations will guide you through the course.
Learning Objectives
Upon successful completion of this course, participants will be able to:
Chapter 1
- Recognize the evolution of computational communication systems, the role of a binary numbering system, and the basics of the character codes of ASCII and Unicode
Chapter 2
- Recognize how to convert a binary number into its decimal equivalent, noting why this knowledge is essential for gaining a greater depth of understanding of how data is stored, moved, manipulated, and processed
Chapter 3
- Recognize the components of the Hexadecimal format (HEX) used to represent binary values
Chapter 4
- Identify file structures, formats, and signatures, noting their roles and relevancy in cyber forensic investigations
Chapter 5
- Identify the elements and functions of the boot process, including the Master Boot Record (MBR) and the Basic Input Output System (BIOS)
- Recognize different file systems and their relationship and relevance to cyber forensics
Chapter 6
- Recognize the concept of endianness, the attribute of a system that indicates whether integers are represented from left to right or right to left
Chapter 7
- Recognize the attributes of volume versus partition, noting mounting the file system, logical block addresses, and the storage and representation of data and its importance to the cyber forensic investigation process
Chapter 8
- Identify the components of FAT 12/16 file systems and the ‘mounting’ of data into identifiable information
Chapter 9
- Identify the attributes of file systems beyond FAT, including the New Technology File System (NTFS)
Chapter 10
- Identify cyber forensic investigative smart practices, noting the forensic process and the applicable steps in the investigative process
Chapter 11
- Cite the sequencing of events and protocols necessary to cyber forensic investigations
Chapter 12
- Identify forensic investigative smart practices for incident closure, noting the steps and protocols for communicating findings, reporting, retention and curation of evidence, investigation wrap-up, and the investigator’s role as an expert witness
Chapter 13
- List the components and steps in the cyber forensic investigation process
Course Specifics
Course ID 9169001 |
Revision Date October 23, 2020 |
Prerequisites There are no prerequisites. |
Advanced Preparation None |
Compliance information
Course Instructor
Frederic Guillossou, CISSP, CCE, is an Information Security Analyst with TALX, a division of Equifax. He regularly trains on intrusion prevention systems and has successfully led a number of forensic investigations in the field.

Albert Marcella is the president of Business Automation Consultants, LLC, a global information technology and management consulting firm providing IT management consulting, audit and security reviews, and training. He’s an internationally recognized public speaker, researcher, workshop and seminar leader, and the author of numerous articles and books on subjects related to IT, audit, and security.
Cyber Forensics

CPE CREDITS
12 Credits: Specialized Knowledge
$336.00 – $376.00

QAS Self-Study

Basic

CPE Credits
12 Credits: Specialized Knowledge
Course Description
Applicable to all work environments, cyber investigation scenarios, and technologies, this course addresses the fundamental concepts found in the rapidly evolving field of cyber forensics. The materials explain the basic principles of data as building blocks of electronic evidential matter used in cyber forensics investigations. The text is written in a step-by-step manner, beginning with the elementary building blocks of data, and progressing upwards to the representation and storage of information. Practical examples and illustrations will guide you through the course.
Learning Objectives
Upon successful completion of this course, participants will be able to:
Chapter 1
- Recognize the evolution of computational communication systems, the role of a binary numbering system, and the basics of the character codes of ASCII and Unicode
Chapter 2
- Recognize how to convert a binary number into its decimal equivalent, noting why this knowledge is essential for gaining a greater depth of understanding of how data is stored, moved, manipulated, and processed
Chapter 3
- Recognize the components of the Hexadecimal format (HEX) used to represent binary values
Chapter 4
- Identify file structures, formats, and signatures, noting their roles and relevancy in cyber forensic investigations
Chapter 5
- Identify the elements and functions of the boot process, including the Master Boot Record (MBR) and the Basic Input Output System (BIOS)
- Recognize different file systems and their relationship and relevance to cyber forensics
Chapter 6
- Recognize the concept of endianness, the attribute of a system that indicates whether integers are represented from left to right or right to left
Chapter 7
- Recognize the attributes of volume versus partition, noting mounting the file system, logical block addresses, and the storage and representation of data and its importance to the cyber forensic investigation process
Chapter 8
- Identify the components of FAT 12/16 file systems and the ‘mounting’ of data into identifiable information
Chapter 9
- Identify the attributes of file systems beyond FAT, including the New Technology File System (NTFS)
Chapter 10
- Identify cyber forensic investigative smart practices, noting the forensic process and the applicable steps in the investigative process
Chapter 11
- Cite the sequencing of events and protocols necessary to cyber forensic investigations
Chapter 12
- Identify forensic investigative smart practices for incident closure, noting the steps and protocols for communicating findings, reporting, retention and curation of evidence, investigation wrap-up, and the investigator’s role as an expert witness
Chapter 13
- List the components and steps in the cyber forensic investigation process
Course Specifics
Course ID 9169001 |
Revision Date October 23, 2020 |
Prerequisites There are no prerequisites. |
Advanced Preparation None |
Compliance information
Course Instructor
Frederic Guillossou, CISSP, CCE, is an Information Security Analyst with TALX, a division of Equifax. He regularly trains on intrusion prevention systems and has successfully led a number of forensic investigations in the field.

Albert Marcella is the president of Business Automation Consultants, LLC, a global information technology and management consulting firm providing IT management consulting, audit and security reviews, and training. He’s an internationally recognized public speaker, researcher, workshop and seminar leader, and the author of numerous articles and books on subjects related to IT, audit, and security.
Cyber Forensics

CPE CREDITS
12 Credits: Specialized Knowledge
$336.00 – $376.00