Meet our expert - Cordny Nederkoorn
Meet our expert - Cordny Nederkoorn Cordny Nederkoorn is a software and data analyst with over 10 years of experience …
Meet our Expert - Petter Anderson Lopes
Meet our Expert: Petter Anderson Lopes Petter Anderson Lopes is Founder and CEO of PERITUM – Consultoria e Treinamento LTDA. Co-author of …
Meet Our Expert - Renato Basante Borbolla
Meet Our Expert - Renato Basante Borbolla Born in São Paulo, Brazil. Degree in information security technology. Works as CyberSecurity Analyst, Post-graduation …
Meet our expert - Deivison Franco
Deivison P. Franco: Master in Computer Science and in Business Administration. Specialist in Forensic Science (Emphasis in Computer Forensics) and in …
Meet our expert - David Shelton
David Shelton is a licensed Private Investigator and the Owner of Advanced Technology Investigations, LLC in Greensboro, North Carolina. David …
Meet our expert - Dr Craig Wright
Dr Craig Wright is a lecturer and researcher at Charles Sturt University and executive vice –president (strategy) of CSCSS (Centre …
Meet our Expert - Petter Anderson Lopes
Meet our Expert: Petter Anderson Lopes Petter Anderson Lopes is Founder and CEO of PERITUM – Consultoria e Treinamento LTDA. Co-author of …
Meet our expert - Deivison Franco
Deivison P. Franco: Master in Computer Science and in Business Administration. Specialist in Forensic Science (Emphasis in Computer Forensics) and in …
Meet our expert - Lori Denzer
Lori Denzer; CISSP is a technical information security professional who served as the CISO for two critical government agencies as …
TATU YLONEN
Tatu Ylönen is the CEO and founder of SSH Communications Security. While working as a researcher at Helsinki University of …
Meet our expert - PhD Lasith Yasakethu
Lasith Yasakethu received his BSc. Engineering degree (First Class Hons.) in Electrical and Electronic Engineering from the University of Peradeniya, …
MEET OUR EXPERT - PHILLIP SHADE
Phillip D. Shade is a Senior Network / Forensics Engineer and founder of Merlion’s Keep Consulting, a professional services company specializing …
Meet our expert - Larry Smith
Larry Smith is the owner and operator of Nevada Digital Forensics based out of Las Vegas, Nevada. Larry was a …
Meet our expert - Dr. Johnette Hassell
Dr. Johnette Hassell has 30 years experience in computer-related litigation support. A retired computer science professor, she is a court-recognized …
Meet our expert - Krystina Horvath
Krystina Horvath, MBA is currently in the midst of a career change from finance to computer forensics. Krystina is working …
Meet our expert - Eric Laurent-Ricard
Eric Laurent-Ricard, member of various Expert witness companies (CNEJITA-CEESD-CIECAP), he owns a Phd in computer sciences, and created in 1993, …
Meet our expert - Ali Fazeli
Ali Fazeli has been involved in the information technology field since his younger days. He later pursued his higher studies and …
Meet our expert - Bryan Soliman
Bryan Soliman is a Senior Solution Designer currently working with Ontario Provincial Government of Canada. He has over twenty four …
Meet our expert - Alexey Lyashko
Alexey Lyashko was born on January 16th 1979 in a small town of Gorlovka, Donetsk district, Ukraine (it was then …
Meet our expert - Clifton Coetzee
Clifton Coetzee is a forensic psychophysiologist and certified fraud investigator; Instructor and Examiner in the disciplines of polygraph, voice-stress analysis, …
Meet our expert - Kevin Moker
I have been in the information security field since 1990. I started my career with the United States Army as …
Meet our expert - Davide Barbato
Davide Barbato has 10 years of IT experience, the last three in Digital Forensics and Incident Response. He is currently …
Meet our expert - Doug Carner
Doug Carner I am an audio - video enhancement and authentication expert, and am board certified by the American College …
MEET OUR EXPERT - ED WIGET
Ed Wiget started working in Information Security in 1995 and digital forensics in 1997. He has designed and taught related …
Boost Your DFIR Investigative Mindset!
Brett Shavers With all the hype around Artificial Intelligence (AI) in Digital Forensics and Incident Response (DFIR), you might wonder …
Data Carving Xbox One using Belkasoft Evidence Center X
Viviane Cruz Paraphrasing Edmond Locard, the father of forensic computing: "every action leaves a trace," whether it's on cell phones, …
Navigating Data Recovery: Solutions, Pros, Cons, and Permanent Deletion Tips
Tharaka Singharage In today’s digital age, data recovery has become an increasingly important topic. While everything is functioning smoothly, we …
Getting Started in Cyber Security Forensics with AI and ChatGPT
Cyber security forensics, or digital forensics, is a crucial field within cyber security, focusing on the identification, preservation, analysis, and …
Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62)
This course is aimed at presenting an elementary yet comprehensive picture of the field of digital audio forensics, with the implied hope that it will afford the participant useful theoretical and practical knowledge of the field and its various aspects.
DFIR in AWS (W63)
This course provides a crucial skill set in securing AWS environments. In today's digital landscape, understanding digital forensics, incident response, and automation in AWS is essential for safeguarding data and infrastructure. This course offers hands-on experience, making it an invaluable asset for those eager to enhance their cybersecurity expertise and stay ahead in the dynamic field of cloud security.
Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61)
"Micro-drone Warfare: Cybersecurity Implications and Countermeasures" is an advanced course designed for digital forensics professionals seeking to understand the cybersecurity challenges posed by the increasing use of micro-drones in modern warfare. The course provides an in-depth exploration of micro-drone technologies, their role in cyber threats, and the countermeasures necessary to mitigate these threats. Learners will delve into the various types and capabilities of micro-drones, their communication and networking technologies, and the associated cybersecurity vulnerabilities. The course covers risk assessment and threat modeling for micro-drone systems, analysis of real-world micro-drone warfare scenarios, and the development of defense strategies against potential cyber attacks. Additionally, the course addresses the legal and policy frameworks governing micro-drone warfare cybersecurity, including ethical considerations, privacy implications, and international regulations. The course is led by Rhonda Johnson, a seasoned educator and Ph.D. student specializing in Cybersecurity. Prior knowledge of computer networks, cybersecurity principles, operating systems, basic electronics, and wireless communication is recommended. The course employs tools such as Drone Simulators and Drone Performance Evaluation Tools for practical learning.
Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60)
The course is intended for individuals from the IT industry as well as those outside of it who have some knowledge of cybersecurity. Basic concepts of cybersecurity are required. During the course, participants will acquire skills related to: Understanding digital forensics, including its scope, relevance in investigations, and legal and ethical considerations. Concepts of data integrity and its significance in digital forensics. They will learn about various threats to data integrity and techniques for ensuring its preservation throughout the forensic process. Principles of evidence handling, including chain of custody, documentation, and the importance of maintaining the integrity of evidence. Legal and ethical considerations related to digital evidence handling. This includes understanding privacy and confidentiality considerations and the role of expert witness testimony in courtroom presentations. Data acquisition techniques for different types of digital devices. They will learn about disk imaging, integrity verification, and the use of hash functions in maintaining data integrity. Techniques for analyzing and examining digital evidence, including file system analysis, data recovery, reconstruction techniques, and metadata analysis. The course also includes practical application of various tools and technologies used in digital forensics, such as Autopsy, The Sleuth Kit (TSK), Volatility, Plaso, Wireshark, Bulk Extractor, OSForensics, and Autopsy Browser. At the end of the course, a final exam is planned consisting of multiple-choice questions on the concepts and fundamentals arising from the course outcomes, along with practical tasks.