Training is conducted in BYOL (bring your own laptop) formula. It gives you access to all the excercises and configurations. You can always reach out for them when setting up your environment.
Customer laptop requirements:
Are you fascinated by the world of cybercrimes? Do you want to learn the latest technologies used in IT forensics? Are you required to know how to deal with the situation where the protection of evidence on mobile devices is crucial? Do not hesitate and sign up today for training in computer forensics in the Dagma Authorized Training Center!
Our training courses are carried out by experts in computer forensics, recognised in Poland and worldwide. Their knowledge is confirmed by numerous certificates and diplomas. The fact that Polish courts and the police regularly ask them for help in obtaining evidence for ongoing investigations reflects high qualifications and extraordinary experience of our trainers.
During the first day of training you will learn the basics necessary to start an adventure with IT forensics. You will learn what digital evidence is and how it should be handled. You will learn digital investigative techniques. You will learn how to protect data contained on a digital medium and how to give them evidential value. You will also become familiar with devices and software necessary in the world of computer forensics. Moreover, you will have a unique opportunity to practice media protection methods using the world's best Logicube's Falcon devices, as well as mobile devices through UFED by Cellabrite - a leader in computer forensics specialising in mobile devices. We will also provide you with a tool to secure encrypted copies of hard drives from Mac Recon - Sumuri
On the second day of training, we will teach you how to create your own analytical environment that you can use for many years of your career. We will reveal how to conduct digital media analysis examination entirely without software, how to secure data when only CDLive with Linux is available. We will also reveal the secrets of VSS systems analyses, MFT board, ways to hide and search information in alternative data streams, ways of hiding text in graphics (steganography), and we will present "a hundred" other issues in the field of advanced techniques used in computer forensics.
On the third day, we will focus on mobile devices - you will learn about programmes and tools that help to extract information stored in the memory of mobile devices with the use of Cellebrite's world-renowned UFED devices. You will learn how to use specialised software, logical extraction of devices and SIM cards, the methods for extracting the file system and how to search for specific information in the jungle of all your data.
The entire training is based on practical tasks carried out on prepared images of mobile devices, as well as on real smartphones and tablets. This stage of training will introduce you to the world of analysis of existing and deleted data, building regular expressions that allow you to search data in hexadecimal codes and searching for artefacts to bypass user security and locks.
21 h (3 days x 7 h)
Call Us: +48 800 080 322
3 d x 7 h (Total 21 h)
Do you have any questions?
Do you need more information?
Do you want to pre-book the place?
+48 32 259 11 80