An Introduction to Digital Forensics
An understanding of digital forensics is essential to the protection of your organisation in the event of a security breach that involves the loss of confidential information.
The IT Governance Digital Forensics Foundation course is designed to deliver a comprehensive introduction to digital forensics and help you develop an effective forensic readiness plan for your organisation.
Comply with the Security Policy Framework
The adoption of a forensic readiness policy is now a mandatory requirement of the Security Policy Framework (SPF) of all UK government departments (HMG Security Policy Framework v.4.0, May 2010). If your company is a supplier to UK national or local government, you may also require a forensic readiness policy.
Attendance at this Digital Forensics Foundation course provides critical advice that enables you to fulfill the Cabinet Office ‘minimum mandatory measures’ requirement to have a ‘forensic readiness policy’, covering issues to consider in defining a strategy, identifying responsibilities and putting the required arrangements in place.
"Very good presentation from an enthusiastic knowledgeable person."
Jerry Holcroft, Greenwoods Communications
Gain a complete understanding of Digital Forensics
By attending this course, you will learn:
- How to protect your corporate information
- How to manage a Digital Incident
- Where to look for Digital Evidence
- How to preserve Digital Evidence correctly?
- How to select a Digital Forensics Investigator
What does this course cover?
Digital Forensics – the art and science of digital forensics - get an introduction to the basics of digital forensics as a discipline plus an instructive overview of the types of information which can be found on computers, mobile phones and other forms of digital media. This includes passwords, Google searches, web surfing history, deleted documents and emails.
Preventing Data Leakage - learn how to minimize the risk of data loss without necessarily spending thousands on technology. You will learn practical solutions to help prevent both accidental and deliberate data security breaches. High-technology techniques that are used for Data Hiding will be revealed and discussed.
Dealing with computer incidents in the workplace – learn how to contain and limit the damage and how to preserve the evidence, including what to look for to make sure that your organization manages the situation correctly.
Preparation Strategy and Forensic Readiness: Security incidents present a range of challenges to first responders. Preparation and planning are the key to meeting these challenges head on. This section details vital preparations and measures that will keep volatile situations under control and so helps you plan for the inevitable data security breach.
"An excellent introduction for the time period. Good to have insight from someone who is a practitioner"
Richard Sargent, IT Security Engineer, Scottish & Southern Energy
Certification and Professional Development
Those that attend the course will receive a formal IT Governance Digital Forensics Foundation Training Certificate this course qualifies for 8 CPE
credits, or 8 hours for all professional Continuous Professional Education programs.
Learn from an industry expert
This course is taught by a highly qualified Computer Forensics specialist and Expert Witness. Currently a Chief Investigator in private practice working on both Civil and Criminal enquiries, this experienced analyst has been trained to an advanced level in current digital forensic methodologies and tools.
An advisor on security issues to a both large Corporates and SMEs, the presenter is well informed on the latest internal and external threats. This knowledge is enhanced by more than 15 years’ experience in investigations and undercover work. The course tutor is also a full member of the Institute of IT Trainers.
ISO27001 Compliance and Best Practice
The ISO27001 standard requires (Control A.13.2.2) an organisation to list, quantify and monitor all security breaches and incidents. It also requires (Control A.13.2.3) that any evidence that it presents in a criminal or civil action against an individual or company fully conforms to all relevant legislation. The best practice advice provided by ISO27002 outlines that these requirements are best achieved by implementing incident response and forensic readiness plans. All such plans are major contributors to ensuring conformance to ISO27001 Clause 7.3 on preventative action – essential to the ISMS continual process improvement.
"Tutor's knowledge base is excellent & diverse around the subject."
Peter Wilson, Information Governance Manager, Sheffield Teaching Hospital
"The trainer was very knowledgeable and I was very pleased to have such an experienced person taking this training."
Stephen Cutts, Technical Manager, Hertfordshire County Council
- Our package includes lunch and refreshments, and full course materials.
- This course is also available to be delivered in-house, call or email us for further details.
- Although the course is non-residential, we offer help finding appropriate hotels, close to the training venue. To take advantage of this offer, drop us an e-mail after you book your course.
- Delegates travelling from outside the UK, Click here to find out the variety of ways we can help organise your trip.
How to book?
There are three ways to book your course, either online, via fax, or telephone:
- To book via telephone just call us on 0845 070 1750, and we'll take care of the details.
- To book via fax download our booking form, complete it and fax to us on +44 (0) 1353 662667.
- To book online simply enter the number of delegates you wish to send into the
"Quantity" and select the course date from the drop down menu and click "Order now".
We can also accept purchase orders from local authorities, government departments, and other public sector organisations and will consider account facilities for large corporate customers, follow this link to our payment options page for more information.