Lunesys’ Advanced Computer Forensic Training Workshop

LuneSys’ Advanced Computer Forensics Training workshop is the most hands on and highly technical computer forensics training course available anywhere!

Course Details

Computer criminals are becoming increasingly crafty. Many perpetrators of computer crime are savvy enough to write over files instead of deleting them, clear slack space, and even damage the logic controllers on hard disks containing evidence! Evidence that you previously may have determined was “unrecoverable” can now be recovered after attending LuneSys’ Advanced Computer Forensics training course. Acquiring hard to recover evidence is not enough though, in order for evidence to be of use to yourself, the computer forensics investigator, it must be properly analyzed and interpreted. Much of the Advanced Computer Forensics course covers hard core, in-depth analysis of recovered data. Such topics as advanced Windows Registry Snapshotting & Recovery, reading SMART data from a damaged hard drive, and advanced file system forensics are covered in great depth.

The goal of LuneSys’ Advanced Computer Forensics training course is to train you on advanced forensic recovery techniques as well as advanced data analysis strategies not available elsewhere.

Total Hands-On Lab Environment in Computer Forensics Training…

This Computer Forensics training neatly meshes the skills required in order to respond to security incidents:

  • Firmware issues
  • Recovering evidence from Print & Spool files
  • Recovering OLE Metadata
  • Understanding Recycle Bin INFO2 file format structure
  • Recovering data from INFO2
  • Windows Registry fundamentals
  • Determining time bias via SYSTEM
  • Understanding and recovering Windows Restore Points
  • Recovering Orphan folders
  • Internet Explorer Forensics
  • Internet Explorer “Auto complete” recovery
  • Browser Toolbar Forensics
  • Reversing the Google Toolbar
  • AOL Instant Messenger Forensics
  • Yahoo and MSN Messenger Forensics
  • Volume Analysis
  • RAID Volume Recovery
  • MFT Entry Attribute Concepts
  • FAT32 FSINFO forensics
  • $MFT, $MFTMirr, $BOOT and $Volume file format analysis
  • Understanding $BadClus
  • Recovering “fixup” values
  • Expert Witness Testimony

With LuneSys’ Advanced Computer Forensics training, you will gain the skills to propel yourself to being one of the top computer forensics investigators on the market today.

Required Prerequisites:

  • Firm understanding of the Windows Operating System
  • Firm understanding of computer hardware
  • Experience with computer forensics
  • Attendees can be anyone involved in the security of information assets: information security officers and managers, network administrators, Windows administrators.

Lunesys’ Other Training Workshops

Ethical Hacking

Ethical Hacking / Penetration Testing Training Workshop

Penetration Testing

The control of information is something the elite always does… Information, knowledge, is power.” – Tom Clancy

Computer Forensics Investigator

The incident was not the end of the world. We can backtrack!

Learn to uncover and interprete electronic data

How to conduct forensically sound computer examinations with forensic recovery techniques

CISSP Boot Camp

Credential demonstrates that an IT professional understands full range of security for the automated information system.

Certified Information System Security Professional (CISSP)

Our CISSP boot camp course ensures that you can review the CBK in-depth and prepare for the certification exam.

Enterprise Security Awareness for IT Users

Information Technology professionals are typically in need of on-target security knowledge that they can directly apply to their everyday work.

A Must-Have Training for Every IT User of your Organization

LuneSys’ Enterprise Security Awareness Training for IT Professionals utilizes lectures with hands-on lab work to ensure practical knowledge transfer.

Why Choose Lunesys

      • We are not a jack-of-all-trades involved in every sort of business and training;
      • We are focused on information security management purely, which rally us round understanding and facilitating the clients’ specific need;
      • We have an extensive range of highly qualified trainers, a comprehensive range of professional public training courses, enabling the potential participants to hit upon and sign up for exactly the training they need, in their most suitable time span;
      • We don’t only provide trainings but also offer the implementation of the theories, which gives us an edge to assist the participants later in their practical epochs;
      • The most reasonable price is another advantage we offer;
      • Our previous clients’ great satisfaction and highly-rating testimonials are our honor.