Digital Forensics Training Courses
Attendance at this course provides critical advice to enable you to fulfill the Cabinet Office ‘minimum mandatory measures’ requirement to have a ‘forensic readiness policy’, covering issues to consider in defining a strategy, identifying responsibilities and putting the required arrangements in place.
It also touches on on what you might look for in a Forensics Expert, helping ensure you get value for money
Book your Digital Forensics Foundations training course through IT Governance and let our outstanding training service team take care of you from start to finish.
Making your booking couldn’t be easier - chose your training course by selecting a date on the grid below. Please note all courses are subject to availability at the time of booking.
What does this course cover?
Digital Forensics – the art and science of digital forensics is explained. You will get an introduction to the basics of digital forensics as a discipline plus an instructive overview of the types of information which can be found on computers, mobile phones and other forms of digital media. This includes passwords, Google searches, web surfing history, deleted documents and emails.
Preventing Data Leakage - you will learn how to minimize the risk of data loss without necessarily spending thousands on technology. You will learn practical solutions to help prevent both accidental and deliberate data security breaches. High-technology techniques that are used for Data Hiding will be revealed and discussed.
Dealing with computer incidents in the workplace – you will learn how to contain and limit the damage and how to preserve the evidence, including what to look for to make sure that your organization manages the situation correctly.
Preparation Strategy and Forensic Readiness: Security incidents present a range of challenges to first responders. Preparation and planning are the key to meeting these challenges head on. This section details vital preparations and measures that will keep volatile situations under control and so helps you plan for the inevitable data security breach.
Book today so you don't miss out!