Computer Forensics

Computer Forensics

Computer Forensics

Who should attend ?

IT Security Centre Personnel, Auditors, CERT members.

Prerequisites

Basic knowledge of Linux and Windows operating systems.

Course Syllabus

  • Computer incident response
  • Preliminary stages of computer analysis
  • Information about NTFS, FAT32, ext2, ext3 file systems (how files are opened, saved and deleted in these systems)
  • Non-volatility of data in different components of a computer (RAM, “Stack” area, hard disks etc.) Data storage and retrieval from these components
  • Conducting computer analysis on a Linux system and
presentation of related tools
  • In the applied part of the course, setting up the analysis environment
and conducting, with tools, the analysis of a suspected file
  • Conducting computer analysis on a Windows system and
presentation of related tools

Duration

3 Days.

Benefits

Attendees will be able to conduct computer analysis on their own.

Course Tutor

Muharrem Aydın

Computer Engineer, Cyber Security Expert, IT Lawyer

After 10 years of software engineering experience with titles of software developer, product manager, and integration architect, I have been working in cyber security domain for last 10 years. I am not only a cyber security expert but also the head and kick-starter of a cyber security consultancy unit.

In security field, I have performed dozens of penetration tests for institutes from different sectors: finance, military, state agencies, and telcos.

I have been consulting different compaines in security field which includes global banks such as ING Bank, HSBC, CitiBank and more.

In addition, I am an adjunct instructor in a university and teaching cyber security for years.

I involved in technical areas and has taken responsibilities in:

  • Penetration tests (Pentests) and security audits
  • Cyber security training & consultancy
  • Source code analysis & secure software development
  • Cyber security incident response
  • Information security management system (ISMS) consultancy Open source cyber security systems, such as OpenVAS, OSSEC, OSSIM, Snort, Suricata, mod security

I’m creating my courses by using my know-how and 10 years of experience. As a result, our first course “Hacking Web Applications and Penetration Testing: Fast Start!” has gained “Best Seller” reputation in its category.

I have risen a lot of cyber security experts from scratch, and you are the next.