Innovation.  Leadership.  Results   

 0780 187 379 

 KEBS/NQI/M/CORP/33

NITA /TRN / 986

Equip Africa Digital Forensics

The rate of fraud, abuse and downright criminal activity on IT systems by hackers, contractors and even employees are reaching alarming rates. Corporate IT, Law Enforcement and Information Security Pros are often required to perform computer forensics duties on their jobs. Computer Forensics Specialists are needed by today's companies to determine the root cause of a hacker attack, collect evidence legally admissible in court, and protect corporate assets and reputation.

Download Brochure

Downlad Application Form

Target Group

IT Managers, Lawyers, Law Enforcement Officers (Police), Information Security Experts, Court Staff, Network and System Administrators.

Pedagogical Approach (Method Employed)

Highly interactive and practical format: Case discussions, Practical case scenarios, complemented by group work and lectures. Maximum number of participants: 30

Learning outcomes

After taking the course the participants will be able to:

  • See the dark side of how computer crimes are committed.
  • Find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques.
  • Recover data intentionally hidden or encrypted by perpetrators. 
  • Perform a legally admissible forensics investigation and the skills to run the investigation properly.
  • Learn how to create an effective computer crime policy, and gain the hands on skills to implement it.

Key Topics

  • Overview of Computer Crime
  • Computer Forensics Principles and Investigations
  • Digital Forensics Systems, Tools and Techniques
  • Linux/Unix Computer Forensics
  • Windows Computer Forensics
  • Network Forensics
  • In-depth Memory Forensics
  • Smartphone Forensics
  • Reverse Engineering: Malware Analysis tools and Techniques
  • Acquisition, Collection and Seizure of Evidence.
  • Carving out files "hidden" in storage media
  • The marking, storage, transmission and presentation of Digital Crime evidence
  • Law for Forensics Professionals
  • Computer Crime Policy and Incidence Response Plan
    BOOK ONLINE