Computer Forensics Fundamentals
What you'll learn
- Learn the fundamental process for Computer Forensics
- Learn how to understand Cyber Crime and Forensics
- Understand the Computer Forensics Planning
- Plan your Security Incidents for your Enterprise Business
- Any Computer User
- Any IT User
Learn the fundamentals of Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.
Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted as reliable within U.S. and European court systems.
In the early 1980s personal computers became more accessible to consumers, leading to their increased use in criminal activity (for example, to help commit fraud). At the same time, several new "computer crimes" were recognized (such as cracking). The discipline of computer forensics emerged during this time as a method to recover and investigate digital evidence for use in court. Since then computer crime and computer related crime has grown, and has jumped 67% between 2002 and 2003. Today it is used to investigate a wide variety of crime, including child pornography, fraud, espionage, cyberstalking, murder and rape. The discipline also features in civil proceedings as a form of information gathering (for example, Electronic discovery)
Computer forensic investigations usually follow the standard digital forensic process or phases which are acquisition, examination, analysis and reporting. Investigations are performed on static data (i.e. acquired images) rather than "live" systems. This is a change from early forensic practices where a lack of specialist tools led to investigators commonly working on live data.
Who this course is for:
- IT Users
- Any Computer User
J.S Garcia “Juan Sebastian Garcia” is an Engineer and an Author. His Family moved to Brooklyn, NY, in 1992 where he grew up. He’s the youngest of four children. After he graduated as a Computer Forensics Investigator from the Electronic Commerce Council University in NM, he is also certified as an Avaya Certified Expert, CEH, CHFI, CCNA, ENA, Oracle DBA.
Over 20 Years of experience in IT Infrastructure Teams and management, Specialized in Telecomunications, Contact Centers, Cloud, Virtualization, Security. Motivated, adaptable, customer focused, results driven, and hard working Information Technology Professional With proven ability to work under any pressure and deliver desired outcome of high quality requirements and customer deadlines. Worked at top companies, including Harry and David, Amerigroup Corp, IDT Corp, RFA Corp, Cable and Wireless Business and many more. Strong communication and interpersonal skills demonstrated in working with colleagues and customers across the global. Implemented more that 120.000 users worldwide and 32.000 Call Center Agents in 20+ Countries from design to implementation and customer satisfaction.