Description
Course Outline
Module 1 – Digital Forensics – the what, where, when, how and why
Module 2 – Virtual Infrastructure
Module 3 – Forensic Investigation Process
Module 4 – VI Forensics Scenario 1: Identifying direct evidence of a crime
Module 5 – VI Forensics Scenario 2: Attributing Evidence to Specific Requests
Module 6 – VI Forensics Scenario 3: Confirming (or negating) suspect alibis
Module 7 – VI Forensics Scenario 4: Confirming (or negating) suspect statements
Module 8 – VI Forensics Scenario 5: Determining (or negating) suspect intent& Scanning
Module 9 – VI Forensics Scenario 6: Identifying sources
Module 10 – VI Forensics Scenario 7: Authenticating documents
Module 11 – Putting it all together – Course Summary
Course Objectives
Participants will be able to apply forensically-sound best practice techniques against virtual infrastructure entities in the following use case scenarios:
Identifying direct evidence of a crime
Attributing evidence to specific suspects
Confirming (or negating) suspect alibis
Confirming (or negating) suspect statements
Determining (or negating) suspect intent
Determining (or negating) Identifying sources
Determining (or negating) Authenticating documents
Who Should Attend?
Virtual infrastructure specialists (Architects, engineers, Administrators), Forensic investigators Forensic investigators