SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
CERTIFIED LEAD
FORENSICS EXAMINER

ANSI Accredited Program
PERSONNEL CERTIFICATION
#1003

MASTERING THE IMPLEMENTATION AND MANAGEMENT OF COMPUTER FORENSICS
PROCESSES
SUMMARY
This five-day intensive course enables the participants to develop the necessary expertise in mastering the computer
forensics processes as specified in CLFE certification. Participants will gain a thorough understanding of fundamental
computer forensics, based on the best practices used to implement the forensics evidence recovery and analytical
processes. The CLFE certification focuses on core skills required to collect and analyze data from Windows, Mac OS X,
Linux computer systems, as well as from mobile devices.

COURSE AGENDA

DURATION: 5 DAYS

DAY 1
Introduction to scientific principles of
Computer Forensics operations

DAY 2
The computer and operating structure

▶▶ Scientific principles of computer forensics
▶▶ Introduction to computer forensics process approach
▶▶ The analysis and implementation of the fundamental
operations

▶▶ Identification and selection of the characteristics of
the computer structure
▶▶ Identification of peripherals and other components
▶▶ Understanding the operating systems
▶▶ Extraction and analysis of the file structure

▶▶ Preparation and execution of forensics procedures
and operations

DAY 3
Forensics of networks and mobile devices
▶▶ Understanding the network, cloud and virtual
environments
▶▶ Generic methods for data examination in a virtual
environment
▶▶ Examination of a cell phone or tablet
▶▶ Enumeration of cell phones and tablets needed for
forensics examination
▶▶ Storage of information in mobile devices

DAY 5

DAY 4
Computer Forensics tools and
methodologies
▶▶ Enumeration and examination of the computer
hardware and software
▶▶ Determination and testing of corrective measures
▶▶ Analysis and selection of the best procedures for
computer forensics operation
▶▶ Discovery, documentation and return of the evidence
on-site
▶▶ Analyzing and applying the contextual parameters

ANSI Accredited Certification Exam
www.pecb.org
WHO SHOULD ATTEND?
▶▶
▶▶
▶▶
▶▶
▶▶
▶▶
▶▶
▶▶

Computer Forensic specialists
Electronic data analysts
Specialists in computer search and evidence recovery
Professionals working or interested in law enforcement
Professionals willing to advance their knowledge in computer forensic analysis
Members of an information security team
Expert advisors in information technology
Individuals responsible for examining media to extract and disclose data

LEARNING OBJECTIVES
▶▶ To ensure that the CLFE can protect him or herself against injury, threat to credibility and protect the integrity of the
examined media throughout the computer forensics operation
▶▶ To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action
to be followed in order to achieve the goal of the operation
▶▶ To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the
presence of certain ports to the actual or eventual presence of a media containing information to be examined
▶▶ To ensure that the CLFE has a clear knowledge where the information can be found on an electronic media or
bit-stream image of a media, it would be operating the systems or user information, actual deleted or hidden
information
▶▶ To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence
located on a network, in the cloud or in a virtual environment
▶▶ To ensure that the CLFE can conduct a basic, yet forensically sound examination of a cell phone or tablet
▶▶ To ensure that the CLFE can use efficiently the tools (software, hardware and supplies) of the field examination kit
for a better goal achievement of the computer forensics operation
▶▶ To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and
forensically sound manner

ANSI Accredited Program
PERSONNEL CERTIFICATION
#1003

www.pecb.org/accreditation

www.pecb.org
ANSI Accredited Program
PERSONNEL CERTIFICATION
#1003

www.pecb.org/accreditation

EXAMINATION
▶▶ The “Certified Lead Forensics Examiner” exam fully meets the requirements of the PECB Examination and
Certification Program (ECP). The exam covers the following competence domains:

1

DOMAIN 1: SCIENTIFIC PRINCIPLES OF COMPUTER FORENSICS
Main Objective: To ensure that the CLFE can protect himself against injury, threat to credibility and protect the
integrity of the examined media throughout the computer forensics operation

2

DOMAIN 2: COMPUTER FORENSICS OPERATIONS FUNDAMENTALS
Main Objective: To ensure that the CLFE can conduct a complete computer forensics operation and determine the
course of action to be followed to achieve the goal of the operation

3

DOMAIN 3: FORENSICS: COMPUTER HARDWARE STRUCTURE
Main Objective: To ensure that the CLFE can safely handle computers, extract and install peripherals and
components, relate the presence of certain ports to the actual or eventual presence of a media containing
information to be examined

4

DOMAIN 4: FORENSICS: FORENSICS: OPERATING SYSTEMS AND FILE STRUCTURE
Main Objective: To ensure that the CLFE have a clear knowledge where information can be found on an electronic
media or bit-stream image of a media, would it be operating system’s or user information or actual, deleted or
hidden information

5

DOMAIN 5: FORENSICS OF NETWORK, CLOUD AND VIRTUAL ENVIRONMENTS
Main Objective: To ensure that the CLFE can conduct a forensically sound examination, extraction and
preservation of evidence located on a network, in the cloud or in a virtual environment

6

DOMAIN 6: FORENSICS OF CELL PHONES AND TABLETS
Main Objective: To ensure that the CLFE can conduct a basic but forensically sound examination of a cell phone
or a tablet

7

DOMAIN 7: COMPUTER FORENSICS OPERATION TOOLS AND SOFTWARE
Main Objective: To ensure that the CLFE can conduct a basic but forensically sound examination of a cell phone
or a tablet

8

DOMAIN 8: FORENSICS: EXAMINATION, ACQUISITION AND PRESERVATION OF ELECTRONIC EVIDENCE
Main Objective: To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered,
standard and forensically sound manner
▶▶ The “Certified Lead Forensics Examiner” exam is available in different languages, including English, French,
Spanish and Portuguese
▶▶ Duration: 3 hours
▶▶ For more information about the exam, please visit: www.pecb.org

www.pecb.org
CERTIFICATION
▶▶ A certificate of “Certified Lead Forensics Examiner” will be issued to those participants who successfully pass the
exam and comply with all the other requirements related to this credential:
Credential

Exam

Professional
Experience

Education

Other
Requirements

Certified Lead
Forensics
Examiner

Certified Lead
Fo­ensics
r
Examiner Exam

Two years
One year of field
experience in
Computer Forensics

At least
Secondary School

Signing the
PECB
code of ethics

GENERAL INFORMATION
▶▶
▶▶
▶▶
▶▶

Certification fees are included in the exam price
Participant manuals contains over 450 pages of information and practical examples
A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants
In case of failure of the exam, participants are allowed to retake it for free under certain conditions

For additional information,
please contact us at info@pecb.org
ANSI Accredited Program
PERSONNEL CERTIFICATION
#1003

www.pecb.org/accreditation

www.pecb.org

Contenu connexe

En vedette (6)

Work diary sequencing
Work diary   sequencingWork diary   sequencing
Work diary sequencing
 
Pedro alecrim
 Pedro alecrim Pedro alecrim
Pedro alecrim
 
Rustic Cuff Fall/Winter 2013 Collection
Rustic Cuff Fall/Winter 2013 CollectionRustic Cuff Fall/Winter 2013 Collection
Rustic Cuff Fall/Winter 2013 Collection
 
Historia de la administración
Historia de la administraciónHistoria de la administración
Historia de la administración
 
Cadbury’s operations in India.
Cadbury’s operations in India.Cadbury’s operations in India.
Cadbury’s operations in India.
 
Principle of teaching and the learning language
Principle of teaching and the learning languagePrinciple of teaching and the learning language
Principle of teaching and the learning language
 

Similaire à Certified Lead Forensics Examiner - Four Page Brochure

Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
bagotjesusa
 
PeopleCert ExamShield Technical Details.pdf
PeopleCert ExamShield Technical Details.pdfPeopleCert ExamShield Technical Details.pdf
PeopleCert ExamShield Technical Details.pdf
Indranighosh46
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
Gnanavi2
 

Similaire à Certified Lead Forensics Examiner - Four Page Brochure (20)

Certified Lead Forensics Examiner - Two Page Brochure
Certified Lead Forensics Examiner - Two Page BrochureCertified Lead Forensics Examiner - Two Page Brochure
Certified Lead Forensics Examiner - Two Page Brochure
 
Certified Lead Forensics Examiner - One Page Brochure
Certified Lead Forensics Examiner - One Page BrochureCertified Lead Forensics Examiner - One Page Brochure
Certified Lead Forensics Examiner - One Page Brochure
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
 
PeopleCert ExamShield Technical Details.pdf
PeopleCert ExamShield Technical Details.pdfPeopleCert ExamShield Technical Details.pdf
PeopleCert ExamShield Technical Details.pdf
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
 
Getting started in digital forensics
Getting started in digital forensicsGetting started in digital forensics
Getting started in digital forensics
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
GregoryBeynon resume
GregoryBeynon resumeGregoryBeynon resume
GregoryBeynon resume
 
MOSES_NTCV
MOSES_NTCVMOSES_NTCV
MOSES_NTCV
 
ISA.pdf
ISA.pdfISA.pdf
ISA.pdf
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
it_experience
it_experienceit_experience
it_experience
 

Plus de PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

Plus de PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Dernier (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Certified Lead Forensics Examiner - Four Page Brochure

  • 1. CERTIFIED LEAD FORENSICS EXAMINER ANSI Accredited Program PERSONNEL CERTIFICATION #1003 MASTERING THE IMPLEMENTATION AND MANAGEMENT OF COMPUTER FORENSICS PROCESSES SUMMARY This five-day intensive course enables the participants to develop the necessary expertise in mastering the computer forensics processes as specified in CLFE certification. Participants will gain a thorough understanding of fundamental computer forensics, based on the best practices used to implement the forensics evidence recovery and analytical processes. The CLFE certification focuses on core skills required to collect and analyze data from Windows, Mac OS X, Linux computer systems, as well as from mobile devices. COURSE AGENDA DURATION: 5 DAYS DAY 1 Introduction to scientific principles of Computer Forensics operations DAY 2 The computer and operating structure ▶▶ Scientific principles of computer forensics ▶▶ Introduction to computer forensics process approach ▶▶ The analysis and implementation of the fundamental operations ▶▶ Identification and selection of the characteristics of the computer structure ▶▶ Identification of peripherals and other components ▶▶ Understanding the operating systems ▶▶ Extraction and analysis of the file structure ▶▶ Preparation and execution of forensics procedures and operations DAY 3 Forensics of networks and mobile devices ▶▶ Understanding the network, cloud and virtual environments ▶▶ Generic methods for data examination in a virtual environment ▶▶ Examination of a cell phone or tablet ▶▶ Enumeration of cell phones and tablets needed for forensics examination ▶▶ Storage of information in mobile devices DAY 5 DAY 4 Computer Forensics tools and methodologies ▶▶ Enumeration and examination of the computer hardware and software ▶▶ Determination and testing of corrective measures ▶▶ Analysis and selection of the best procedures for computer forensics operation ▶▶ Discovery, documentation and return of the evidence on-site ▶▶ Analyzing and applying the contextual parameters ANSI Accredited Certification Exam www.pecb.org
  • 2. WHO SHOULD ATTEND? ▶▶ ▶▶ ▶▶ ▶▶ ▶▶ ▶▶ ▶▶ ▶▶ Computer Forensic specialists Electronic data analysts Specialists in computer search and evidence recovery Professionals working or interested in law enforcement Professionals willing to advance their knowledge in computer forensic analysis Members of an information security team Expert advisors in information technology Individuals responsible for examining media to extract and disclose data LEARNING OBJECTIVES ▶▶ To ensure that the CLFE can protect him or herself against injury, threat to credibility and protect the integrity of the examined media throughout the computer forensics operation ▶▶ To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action to be followed in order to achieve the goal of the operation ▶▶ To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the presence of certain ports to the actual or eventual presence of a media containing information to be examined ▶▶ To ensure that the CLFE has a clear knowledge where the information can be found on an electronic media or bit-stream image of a media, it would be operating the systems or user information, actual deleted or hidden information ▶▶ To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence located on a network, in the cloud or in a virtual environment ▶▶ To ensure that the CLFE can conduct a basic, yet forensically sound examination of a cell phone or tablet ▶▶ To ensure that the CLFE can use efficiently the tools (software, hardware and supplies) of the field examination kit for a better goal achievement of the computer forensics operation ▶▶ To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and forensically sound manner ANSI Accredited Program PERSONNEL CERTIFICATION #1003 www.pecb.org/accreditation www.pecb.org
  • 3. ANSI Accredited Program PERSONNEL CERTIFICATION #1003 www.pecb.org/accreditation EXAMINATION ▶▶ The “Certified Lead Forensics Examiner” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). The exam covers the following competence domains: 1 DOMAIN 1: SCIENTIFIC PRINCIPLES OF COMPUTER FORENSICS Main Objective: To ensure that the CLFE can protect himself against injury, threat to credibility and protect the integrity of the examined media throughout the computer forensics operation 2 DOMAIN 2: COMPUTER FORENSICS OPERATIONS FUNDAMENTALS Main Objective: To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action to be followed to achieve the goal of the operation 3 DOMAIN 3: FORENSICS: COMPUTER HARDWARE STRUCTURE Main Objective: To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the presence of certain ports to the actual or eventual presence of a media containing information to be examined 4 DOMAIN 4: FORENSICS: FORENSICS: OPERATING SYSTEMS AND FILE STRUCTURE Main Objective: To ensure that the CLFE have a clear knowledge where information can be found on an electronic media or bit-stream image of a media, would it be operating system’s or user information or actual, deleted or hidden information 5 DOMAIN 5: FORENSICS OF NETWORK, CLOUD AND VIRTUAL ENVIRONMENTS Main Objective: To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence located on a network, in the cloud or in a virtual environment 6 DOMAIN 6: FORENSICS OF CELL PHONES AND TABLETS Main Objective: To ensure that the CLFE can conduct a basic but forensically sound examination of a cell phone or a tablet 7 DOMAIN 7: COMPUTER FORENSICS OPERATION TOOLS AND SOFTWARE Main Objective: To ensure that the CLFE can conduct a basic but forensically sound examination of a cell phone or a tablet 8 DOMAIN 8: FORENSICS: EXAMINATION, ACQUISITION AND PRESERVATION OF ELECTRONIC EVIDENCE Main Objective: To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and forensically sound manner ▶▶ The “Certified Lead Forensics Examiner” exam is available in different languages, including English, French, Spanish and Portuguese ▶▶ Duration: 3 hours ▶▶ For more information about the exam, please visit: www.pecb.org www.pecb.org
  • 4. CERTIFICATION ▶▶ A certificate of “Certified Lead Forensics Examiner” will be issued to those participants who successfully pass the exam and comply with all the other requirements related to this credential: Credential Exam Professional Experience Education Other Requirements Certified Lead Forensics Examiner Certified Lead Fo­ensics r Examiner Exam Two years One year of field experience in Computer Forensics At least Secondary School Signing the PECB code of ethics GENERAL INFORMATION ▶▶ ▶▶ ▶▶ ▶▶ Certification fees are included in the exam price Participant manuals contains over 450 pages of information and practical examples A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants In case of failure of the exam, participants are allowed to retake it for free under certain conditions For additional information, please contact us at info@pecb.org ANSI Accredited Program PERSONNEL CERTIFICATION #1003 www.pecb.org/accreditation www.pecb.org