CONTINUING EDUCATION FOR TAX & FINANCIAL PROFESSIONALS
Icon_Self-Study
Self-Study
Icon_Level
Basic
Credits
CPE Credits
12 Credits: Specialized Knowledge

Course Description

Applicable to all work environments, cyber investigation scenarios, and technologies, this course addresses the fundamental concepts found in the rapidly evolving field of cyber forensics. The materials explain the basic principles of data as building blocks of electronic evidential matter used in cyber forensics investigations. The text is written in a step-by-step manner, beginning with the elementary building blocks of data, and progressing upwards to the representation and storage of information. Practical examples and illustrations will guide you through the course.

Learning Objectives

Upon successful completion of this course, participants will be able to:

Chapter 1

  • Recognize the evolution of computational communication systems, the role of a binary numbering system, and the basics of the character codes of ASCII and Unicode

Chapter 2

  • Recognize how to convert a binary number into its decimal equivalent, noting why this knowledge is essential for gaining a greater depth of understanding of how data is stored, moved, manipulated, and processed

Chapter 3

  • Recognize the components of the Hexadecimal format (HEX) used to represent binary values

Chapter 4

  • Identify file structures, formats, and signatures, noting their roles and relevancy in cyber forensic investigations

Chapter 5

  • Identify the elements and functions of the boot process, including the Master Boot Record (MBR) and the Basic Input Output System (BIOS)
  • Recognize different file systems and their relationship and relevance to cyber forensics

Chapter 6

  • Recognize the concept of endianness, the attribute of a system that indicates whether integers are represented from left to right or right to left

Chapter 7

  • Recognize the attributes of volume versus partition, noting mounting the file system, logical block addresses, and the storage and representation of data and its importance to the cyber forensic investigation process

Chapter 8

  • Identify the components of FAT 12/16 file systems and the ‘mounting’ of data into identifiable information

Chapter 9

  • Identify the attributes of file systems beyond FAT, including the New Technology File System (NTFS)

Chapter 10

  • Identify cyber forensic investigative smart practices, noting the forensic process and the applicable steps in the investigative process

Chapter 11

  • Cite the sequencing of events and protocols necessary to cyber forensic investigations

Chapter 12

  • Identify forensic investigative smart practices for incident closure, noting the steps and protocols for communicating findings, reporting, retention and curation of evidence, investigation wrap-up, and the investigator’s role as an expert witness

Chapter 13

  • List the components and steps in the cyber forensic investigation process

Course Specifics

Course ID
9169001
Revision Date
October 23, 2020
Advanced Preparation

None

Compliance information

NASBA Provider Number: 103220

Course Instructor

Frederic Guillossou

Frederic Guillossou, CISSP, CCE, is an Information Security Analyst with TALX, a division of Equifax. He regularly trains on intrusion prevention systems and has successfully led a number of forensic investigations in the field.

Albert Marcella, Jr. Headshot
Albert Marcella, Jr.

Albert Marcella is the president of Business Automation Consultants, LLC, a global information technology and management consulting firm providing IT management consulting, audit and security reviews, and training. He’s an internationally recognized public speaker, researcher, workshop and seminar leader, and the author of numerous articles and books on subjects related to IT, audit, and security.

Cyber Forensics

Format
CPE CREDITS
12 Credits: Specialized Knowledge

$336.00$376.00

Clear
Icon_Self-Study
Self-Study
Icon_Level
Basic
Credits
CPE Credits
12 Credits: Specialized Knowledge

Course Description

Applicable to all work environments, cyber investigation scenarios, and technologies, this course addresses the fundamental concepts found in the rapidly evolving field of cyber forensics. The materials explain the basic principles of data as building blocks of electronic evidential matter used in cyber forensics investigations. The text is written in a step-by-step manner, beginning with the elementary building blocks of data, and progressing upwards to the representation and storage of information. Practical examples and illustrations will guide you through the course.

Learning Objectives

Upon successful completion of this course, participants will be able to:

Chapter 1

  • Recognize the evolution of computational communication systems, the role of a binary numbering system, and the basics of the character codes of ASCII and Unicode

Chapter 2

  • Recognize how to convert a binary number into its decimal equivalent, noting why this knowledge is essential for gaining a greater depth of understanding of how data is stored, moved, manipulated, and processed

Chapter 3

  • Recognize the components of the Hexadecimal format (HEX) used to represent binary values

Chapter 4

  • Identify file structures, formats, and signatures, noting their roles and relevancy in cyber forensic investigations

Chapter 5

  • Identify the elements and functions of the boot process, including the Master Boot Record (MBR) and the Basic Input Output System (BIOS)
  • Recognize different file systems and their relationship and relevance to cyber forensics

Chapter 6

  • Recognize the concept of endianness, the attribute of a system that indicates whether integers are represented from left to right or right to left

Chapter 7

  • Recognize the attributes of volume versus partition, noting mounting the file system, logical block addresses, and the storage and representation of data and its importance to the cyber forensic investigation process

Chapter 8

  • Identify the components of FAT 12/16 file systems and the ‘mounting’ of data into identifiable information

Chapter 9

  • Identify the attributes of file systems beyond FAT, including the New Technology File System (NTFS)

Chapter 10

  • Identify cyber forensic investigative smart practices, noting the forensic process and the applicable steps in the investigative process

Chapter 11

  • Cite the sequencing of events and protocols necessary to cyber forensic investigations

Chapter 12

  • Identify forensic investigative smart practices for incident closure, noting the steps and protocols for communicating findings, reporting, retention and curation of evidence, investigation wrap-up, and the investigator’s role as an expert witness

Chapter 13

  • List the components and steps in the cyber forensic investigation process

Course Specifics

Course ID
9169001
Revision Date
October 23, 2020
Advanced Preparation

None

Compliance information

NASBA Provider Number: 103220

Course Instructor

Frederic Guillossou

Frederic Guillossou, CISSP, CCE, is an Information Security Analyst with TALX, a division of Equifax. He regularly trains on intrusion prevention systems and has successfully led a number of forensic investigations in the field.

Albert Marcella, Jr. Headshot
Albert Marcella, Jr.

Albert Marcella is the president of Business Automation Consultants, LLC, a global information technology and management consulting firm providing IT management consulting, audit and security reviews, and training. He’s an internationally recognized public speaker, researcher, workshop and seminar leader, and the author of numerous articles and books on subjects related to IT, audit, and security.

Cyber Forensics

Format
CPE CREDITS
12 Credits: Specialized Knowledge

$336.00$376.00

Clear