Network Forensic Investigations TRAINING. The Essential Need The knowledge of network packet analysis is important for Forensic Investigators and Lawful.

Slides:



Advertisements
Similar presentations
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
Advertisements

Lesson 1: Introduction to IT Business and Careers
Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.
Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.
1 Cybercrime Decision Group / CEO Casper Kan Chang
Introduction to Cyber Crime Investigation Course Conducted in English Institute for Information Industry Decision Group.
Network Forensics and Lawful Interception Total Solutions Provider
APAC Defense Forum Learning and IT Capacity Building for Defense Sector.
DECISION GROUP The Pioneer of IT Forensics Taipei, Germany, Hong Kong, Singapore.
1 Pertemuan 12 Understanding Computers Carrers and Certifications Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
For the past five years, Eric has provided corporate and governmental training and certifications in Microsoft Office 2007, 2010 and now In addition,
Certify skills through Microsoft ® Office Specialist Microsoft Office Specialist 2007 represents an exciting opportunity for job candidates to validate.
Career number 1. E- Discovery Professional  Electronic Discovery- Technology based Identifies, preserves and manages electronically stored information.
Technology Skills and New Career Opportunities in Policing Professor Byrne Lecture Professor Byrne Lecture September 20 th, 2012 September 20 th, 2012.
10969A Active Directory® Services with Windows Server® Course 10699A
International Association for Campus Law Enforcement Administrators The Leading Authority for Campus Public Safety…..
Advanced Business II Cindy Barnes, Business Teacher.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Cyber Crime & Investigation IT Security Consultant
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
International Academy of Design & Technology International Academy of Design and Technology 555 Grant Street Pittsburgh, PA Programs We Offer Faculty.
1 Principles of Information Technology Investigating IT Employment Opportunities Copyright © Texas Education Agency, All rights reserved. IT: Principles.
You be the Judge! BPA Texas Teachers Provide Academics.
V1.3 Network+ Certification. CompTIA Network+ Certification Vendor Neutral Certification Fulfills the U.S. Department of Defense Directive Fulfills.
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
Cloud Computing Forensics Decision Group 2009 Nov.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
1 Chapter Nine Engineering Your Career. 2 Engineering Careers  Electrical and computer engineers find employment in: 1.Private industry. 2.Government.
Cyber Forensics 網路鑑識 Chang Kan 張 侃 Decision Group / CEO.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Decision Group Inc. E-DETECTIVE Decision Group Inc.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
By: Amanda Breazeale Mrs.Moravits Period 6 9/23/14.
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
A OUTSTANDING EFFORT BY PHOTON INSTRUMENTS STUDENT / FRESHERS SKILL DEVELOPMENT PROGRAMME A JOB CENTRIC INDUSTRIAL TRAINING WITH “APPOINTMENT LETTER”
ParadigmShift Foundation & Tehuti Research Center Spencer Campbell President/Founder July 17,2007.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Business Computer Applications I Business Computer Applications II Accounting Principles I Accounting Principles II Business Law (offered 2017) Intro to.
Courses & Certifications Networking Academy courses are designed to help students prepare for career opportunities, continuing education, and globally.
Jan Garvin, MCSFS Executive Director Law Enforcement & Emergency Services Video Association.
Training and Education for a Career. Every Occupation Requires Preparation Preparation for a job will depend on the job and its duties Some jobs will.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
Teaching and Learning with Technology
Master’s Degree Program in Business Compliance Assurance
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Scope of Digital Marketing as a Career
Associate Degree in Cyber security
Technology Skills and New Career Opportunities in Policing
Career JEOPARDY! Cluster: Information Technology
Criminal Justice Careers
Technology, Careers, and Job Hunting
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Virginia Union University
What It Takes To Be a Revenue Officer
CSCD 330 Network Programming Spring
Network Forensic Investigations
BPA Texas You be the Judge!.
OU BATTLECARD: Oracle Linux Training and Certification
OU BATTLECARD: Oracle Database 12c
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Network Forensic Investigations TRAINING

The Essential Need The knowledge of network packet analysis is important for Forensic Investigators and Lawful Enforcement Agency (LEA) to carry out their daily duty.

The Usual Network Suspects…

Network Training and Forensics Investigators need the ability to identify different packet types according to various Internet Protocols. These include – (POP3, SMTP and IMAP) Web Mail (Yahoo Mail, Gmail, Hotmail) Instant Messaging (Windows Live Messenger, Yahoo, ICQ ) FTP Telnet HTTP VOIP

Network Training and Forensics Network /Administration Training is readily available from many companies Forensics is a specialist skill Hard to find real experienced instructors Network Investigations is also a specialist skill To find instructors with real world experience is essential and yet almost impossible to find…

6 Total Solutions for Cyber Forensics 1.Wired packet reconstruction 2.Wireless ( a/b/g/n) packet reconstruction 3.HTTPS/SSL interceptor 4.VOIP packet reconstruction 5.Off-line packet reconstruction software 6.Network packet forensics analysis training For more information

The knowledge of network packet analysis is important for Forensic Investigators and Lawful Enforcement Agency (LEA) to carry out their daily duty…. But everyone does not need the same training !!!

8 Network Packet Forensics Analysis Training Training consists of three levels… With three different job levels… And three different certifications in mind

9 Courses include Introduction to Network Forensic Analysis Intermediate NPFAT Advanced NPFAT Network Packet Forensics Analysis Training

10 Participants whom successfully complete each course will receive either an accreditation of competency certificate for the Introduction course or certifications of either NPFA (Network Packet Forensics Analyst) or the highly acclaimed NPFE (Network Packet Forensics Expert) through examination as offered through E-Decision. Network Packet Forensics Analysis Training

11 Introduction to Network Forensic Analysis – This 2 day course utilizes the knowledge of computer security concepts together with switched network topologies and gives students hands on practical exposure to critical knowledge base essential for network forensic investigations. Those whom choose can also increase their opportunities by using this course to proceed to the NPFAT certification processes of the following E-Detective courses. Introduction to Network Forensic Analysis

12 Intermediate NPFAT – This 3 day course utilizes the knowledge of digital forensics. It emphasizes network forensics and details knowledge of various Internet protocols as taught within the NPFAT Introduction to Network Forensic Analysis course. Students will be given in-depth hands on experience in using Network Packet Forensics Investigation Tools to understand and analyze various network traffic. Upon successful completion of this course and end course examination, students will be awarded the NPFA (Network Packet Forensics Analyst) certification.. Intermediate Network Protocol Forensic Analysis Training

13 Advanced NPFAT – To attend this course, students are required to have successfully completed the NPFA certification. This 3-day course utilizes the advanced techniques of digital network forensics. It concentrates on network forensics artifacts and details knowledge of various Internet protocols at packet level, further to this case studies and practical sessions will be made available to enhance the students learning experience. Upon successful completion of this course and end course examination, students will be awarded the NPFE (Network Packet Forensics Expert) certification. Advanced Network Protocol Forensic Analysis Training

To find instructors with real world experience is essential and yet almost impossible to find…

…Not for difficult E-Detective classes Our instructors are world class With real world experiences

16 To ensure E-decision supply the possible best learning experience, they have secured the services of 3 masters in the area of networking security and computer forensics training. Introducing Frankie Chan of Singapore, Phillip Russo of Australia and Gustavo Presman of Argentina. Together these instructors bring a fortitude of practical experiences to the classroom to pass onto their students. Meet some of our instructors

17 Ing. Gustavo Presman Mr Frankie Chan Kok Liang Mr Frankie Chan – Frankie has been with Decision Group for about 3 years as VP for Solutions and Professional Service. He is the author of the NPFAT course. He has conducted the first two NPFAT courses in Turkey and Taiwan to some Lawful Enforcement Agencies. He has been invited to speak in some digital forensics conferences in China and Taiwan. Majority of his works involve providing technical and solutions services to partners and customers over the world.

18 Ing. Gustavo Presman Mr Phillip A Russo Mr Phillip Russo – Phillip’s services are sought from organizations all over the world, including other world leading forensic companies such as Digitrail, AcessData, Guidance Software and F-Response. He has instructed to the major of law enforcement agencies of the world including members from Scotland Yard, Hong Kong Police, ICE Immigration Customs Enforcement, the Australian Federal Police. He has taught students at the FBI’s Regional Computer Forensics Labs, AHTCC Australia High Tech Crime Centre and a number of corporate entities including World Banks, the big four, telecommunication defense contractors including Boeing and Rayon. Russo has over 21 years of practical and Police investigational experience. During his policing career he was a forensic investigator and training officer for the Western Australian Police Service’s Computer Crime Investigation Squad. He had had papers published and was called on to deliver presentations at international computer security forums in both Moscow and New York. He presented at the Information Security Summit in Hong Kong in November 2006, and frequently, speaks at the CSI Fraud conferences held in Malaysia and Singapore.

19 Ing. Gustavo Presman Mr Gustavo Presman Gustavo is internationally Certified Specialist in Computer Forensics techniques which include examination of records, data recovery, search of hidden and deleted files.Comunicaciones y Teleinformática. He has twenty years of professional experience in the areas of computing and networking computers. Docente de materias afines. Gustavo is a Professor for few universities in Buenos Aires, teaching in digital forensics related subjects. Perito Judicial de parte y consultor técnico en la especialidad. He is also the Judicial Expert and technical consultant for Armed Forces andInstructor de Fuerzas Armadas y miembros del Poder Judicial en procedimientos de Informática Forense. members of the judiciary in Proceedings of Computer Forensics. Besides, he has been professional member of many engineering and telecommunications organizations.

20 Reference sites Ministry of Defense Singapore Royal Malaysian Military Turkish National Police Hong Kong PoliceRoyal Malaysian Police Macau Public

21 Reference sites in Taiwan The Investigation Bureau of the Ministry of Justice 國家安全局 National Security Bureau 國防部 Ministry of National Defense,R.O.C 憲兵司令部 Military Police, R.O.C 海岸巡防署 Coast Guard Administration 國防大學 National Defense University 中央警察大學 Central Police University 刑事警察局 Criminal Investigation Bureau

22