Network Forensic Investigations

Slides:



Advertisements
Similar presentations
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
Advertisements

Lesson 1: Introduction to IT Business and Careers
Network Forensic Investigations TRAINING. The Essential Need The knowledge of network packet analysis is important for Forensic Investigators and Lawful.
1 Cybercrime Decision Group / CEO Casper Kan Chang
Introduction to Cyber Crime Investigation Course Conducted in English Institute for Information Industry Decision Group.
Network Forensics and Lawful Interception Total Solutions Provider
APAC Defense Forum Learning and IT Capacity Building for Defense Sector.
DECISION GROUP The Pioneer of IT Forensics Taipei, Germany, Hong Kong, Singapore.
1 Pertemuan 12 Understanding Computers Carrers and Certifications Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
For the past five years, Eric has provided corporate and governmental training and certifications in Microsoft Office 2007, 2010 and now In addition,
University of Derby Corporate University of Derby Corporate (UDC) and International Centre for Guidance.
Technology Skills and New Career Opportunities in Policing Professor Byrne Lecture Professor Byrne Lecture September 20 th, 2012 September 20 th, 2012.
10969A Active Directory® Services with Windows Server® Course 10699A
Advanced Business II Cindy Barnes, Business Teacher.
Cyber Crime & Investigation IT Security Consultant
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
International Academy of Design & Technology International Academy of Design and Technology 555 Grant Street Pittsburgh, PA Programs We Offer Faculty.
1 Principles of Information Technology Investigating IT Employment Opportunities Copyright © Texas Education Agency, All rights reserved. IT: Principles.
You be the Judge! BPA Texas Teachers Provide Academics.
V1.3 Network+ Certification. CompTIA Network+ Certification Vendor Neutral Certification Fulfills the U.S. Department of Defense Directive Fulfills.
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
Cloud Computing Forensics Decision Group 2009 Nov.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Ideal Jobs FBI. Field Criminal Justice Criminal Justice is study of the law and is mostly of thinking of the Criminal mind. Jobs: Local law Enforcement:
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
Cyber Forensics 網路鑑識 Chang Kan 張 侃 Decision Group / CEO.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Decision Group Inc. E-DETECTIVE Decision Group Inc.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
Criminal Justice and Journalism By Kirsten Kaiser.
ParadigmShift Foundation & Tehuti Research Center Spencer Campbell President/Founder July 17,2007.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Business Computer Applications I Business Computer Applications II Accounting Principles I Accounting Principles II Business Law (offered 2017) Intro to.
Jan Garvin, MCSFS Executive Director Law Enforcement & Emergency Services Video Association.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
THE GOVERNMENT SYSTEM MALAYSIAN STUDIES. CONTENT Malaysian government system after independent Malaysian leadership the roles of Yang Di-Pertuan Agong,
Chapter 15 Information Technology Careers.
Master’s Degree Program in Business Compliance Assurance
Instructor Materials Chapter 5 Providing Network Services
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Scope of Digital Marketing as a Career
Associate Degree in Cyber security
Technology Skills and New Career Opportunities in Policing
8.1 Levels of Police in Canada/Starting a Police Investigation
Screeners and the Screener Organisation
Career JEOPARDY! Cluster: Information Technology
Criminal Justice Careers
ADA Subject Leader – Computer Science
20341B Core Solutions of Microsoft® Exchange Server 2013.
Technology, Careers, and Job Hunting
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Virginia Union University
CSCD 330 Network Programming Spring
What It Takes To Be a Revenue Officer
CSCD 330 Network Programming Spring
CSCD 330 Network Programming Spring
BPA Texas You be the Judge!.
OU BATTLECARD: Oracle Linux Training and Certification
OU BATTLECARD: Oracle Database 12c
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Network Forensic Investigations TRAINING

The Essential Need The knowledge of network packet analysis is important for Forensic Investigators and Lawful Enforcement Agency (LEA) to carry out their daily duty.

The Usual Network Suspects… @

Network Training and Forensics Investigators need the ability to identify different packet types according to various Internet Protocols. These include – Email (POP3, SMTP and IMAP) Web Mail (Yahoo Mail, Gmail, Hotmail) Instant Messaging (Windows Live Messenger, Yahoo, ICQ ) FTP Telnet HTTP VOIP

Network Training and Forensics Network /Administration Training is readily available from many companies Forensics is a specialist skill Hard to find real experienced instructors Network Investigations is also a specialist skill To find instructors with real world experience is essential and yet almost impossible to find…

Total Solutions for Cyber Forensics Wired packet reconstruction Wireless (802.11 a/b/g/n) packet reconstruction HTTPS/SSL interceptor VOIP packet reconstruction Off-line packet reconstruction software Network packet forensics analysis training For more information www.digi-forensics.com

The knowledge of network packet analysis is important for Forensic Investigators and Lawful Enforcement Agency (LEA) to carry out their daily duty…. But everyone does not need the same training !!!

Network Packet Forensics Analysis Training Training consists of three levels… With three different job levels… And three different certifications in mind

Network Packet Forensics Analysis Training Courses include   Introduction to Network Forensic Analysis Intermediate NPFAT Advanced NPFAT

Network Packet Forensics Analysis Training Participants whom successfully complete each course will receive either an accreditation of competency certificate for the Introduction course or certifications of either NPFA (Network Packet Forensics Analyst) or the highly acclaimed NPFE (Network Packet Forensics Expert) through examination as offered through E-Decision.

Introduction to Network Forensic Analysis This 2 day course utilizes the knowledge of computer security concepts together with switched network topologies and gives students hands on practical exposure to critical knowledge base essential for network forensic investigations. Those whom choose can also increase their opportunities by using this course to proceed to the NPFAT certification processes of the following E-Detective courses.  

Network Protocol Forensic Analysis Training Intermediate Network Protocol Forensic Analysis Training Intermediate NPFAT – This 3 day course utilizes the knowledge of digital forensics. It emphasizes network forensics and details knowledge of various Internet protocols as taught within the NPFAT Introduction to Network Forensic Analysis course. Students will be given in-depth hands on experience in using Network Packet Forensics Investigation Tools to understand and analyze various network traffic. Upon successful completion of this course and end course examination, students will be awarded the NPFA (Network Packet Forensics Analyst) certification. .  

Network Protocol Forensic Analysis Training Advanced Network Protocol Forensic Analysis Training Advanced NPFAT – To attend this course, students are required to have successfully completed the NPFA certification. This 3-day course utilizes the advanced techniques of digital network forensics. It concentrates on network forensics artifacts and details knowledge of various Internet protocols at packet level, further to this case studies and practical sessions will be made available to enhance the students learning experience. Upon successful completion of this course and end course examination, students will be awarded the NPFE (Network Packet Forensics Expert) certification.    

To find instructors with real world experience is essential and yet almost impossible to find…

…Not for difficult E-Detective classes Our instructors are world class With real world experiences

Meet some of our instructors To ensure E-decision supply the possible best learning experience, they have secured the services of 3 masters in the area of networking security and computer forensics training.   Introducing Frankie Chan of Singapore, Phillip Russo of Australia and Gustavo Presman of Argentina. Together these instructors bring a fortitude of practical experiences to the classroom to pass onto their students.

Ing. Gustavo Presman Mr Frankie Chan Kok Liang Mr Frankie Chan – Frankie has been with Decision Group for about 3 years as VP for Solutions and Professional Service. He is the author of the NPFAT course. He has conducted the first two NPFAT courses in Turkey and Taiwan to some Lawful Enforcement Agencies. He has been invited to speak in some digital forensics conferences in China and Taiwan. Majority of his works involve providing technical and solutions services to partners and customers over the world.

Mr Phillip A Russo Ing. Gustavo Presman Mr Phillip Russo – Phillip’s services are sought from organizations all over the world, including other world leading forensic companies such as Digitrail, AcessData, Guidance Software and F-Response. He has instructed to the major of law enforcement agencies of the world including members from Scotland Yard, Hong Kong Police, ICE Immigration Customs Enforcement, the Australian Federal Police. He has taught students at the FBI’s Regional Computer Forensics Labs, AHTCC Australia High Tech Crime Centre and a number of corporate entities including World Banks, the big four, telecommunication defense contractors including Boeing and Rayon.   Russo has over 21 years of practical and Police investigational experience. During his policing career he was a forensic investigator and training officer for the Western Australian Police Service’s Computer Crime Investigation Squad. He had had papers published and was called on to deliver presentations at international computer security forums in both Moscow and New York. He presented at the Information Security Summit in Hong Kong in November 2006, and frequently, speaks at the CSI Fraud conferences held in Malaysia and Singapore.

Mr Gustavo Presman Ing. Gustavo Presman Gustavo is internationally Certified Specialist in Computer Forensics techniques which include examination of records, data recovery, search of hidden and deleted files.Comunicaciones y Teleinformática. He has twenty years of professional experience in the areas of computing and networking computers. Docente de materias afines. Gustavo is a Professor for few universities in Buenos Aires, teaching in digital forensics related subjects. Perito Judicial de parte y consultor técnico en la especialidad. He is also the Judicial Expert and technical consultant for Armed Forces andInstructor de Fuerzas Armadas y miembros del Poder Judicial en procedimientos de Informática Forense. members of the judiciary in Proceedings of Computer Forensics. Besides, he has been professional member of many engineering and telecommunications organizations.

Reference sites Royal Malaysian Military Ministry of Defense Singapore Royal Malaysian Police Hong Kong Police Macau Public Turkish National Police

Reference sites in Taiwan The Investigation Bureau of the Ministry of Justice 國家安全局 National Security Bureau 國防部 Ministry of National Defense,R.O.C 憲兵司令部 Military Police, R.O.C 海岸巡防署 Coast Guard Administration 國防大學 National Defense University 中央警察大學 Central Police University 刑事警察局 Criminal Investigation Bureau