Thumb

Management with adaptable practices

We denounce with righteous indige nation and dislike men who are so beguiled and demo realized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee the pain and trouble that are bound to ensue cannot foresee. These cases are perfectly simple and easy to distinguish. In a free hour, when our power of choice is untrammelled data structures manages data in technology.

Computer Forensics Foundation Training Outline

This course covers the following topics:​

  • Aims, Processes, and Phases of a Forensics Investigation
  • Identification and Seizure
  • Forensic Acquisition
  • Physical and Logical Disks
  • File Systems and Data Storage
  • Forensic Analysis Techniques
  • Forensic Challenges and Reporting

Who should attend this Computer Forensics Training Course?

The course is designed for anybody working in a security role who is in charge of protecting their organisation’s data.

Prerequisites

There are no prerequisites, but some understanding of information security will be an advantage.

Computer Forensics Foundation Training Overview

This Computer Forensics Foundation training course provides you with a comprehensive introduction to the topic for anyone preparing to develop their knowledge in this field. You will learn about Forensic Investigations, the seizure and capture of data storage devices, as well as any analysis techniques used by professionals.

What's included in this Computer Forensics Training Course?

You will be provided with:

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor
  • Refreshments

BCS CISMP (Certificate in Information Security Management Principles) Exam Information

This BCS CISMP (Certificate in Information Security Management Principles) exam is formatted in the following way:

  • Type: Multiple Choice
  • Duration: 2 Hours
  • Supervised: Yes
  • Open Book: No
  • Total questions: 100
  • Pass Mark: 65/100 (65%)
4