Course in Computer Forensic Expertise
100% Online
200 horas
260€
Course in Computer Forensic Expertise
    Course in Computer Forensic Expertise

    Course in Computer Forensic Expertise

    100% Online
    200 horas
    260€
    Seguridad y confianza en tus pagos online.

    Presentación

    The field of computer forensic expertise is witnessing an unprecedented rise in demand, driven by an increasing reliance on digital data and the pressing need to combat cybercrime. Our Course in Computer Forensic Expertise is designed to equip you with the skills and knowledge required to navigate this dynamic landscape. Through this online programme, you will delve into the intricacies of digital investigations, mastering techniques to identify, preserve, and analyse electronic evidence. This course offers a unique opportunity to become a vital player in safeguarding digital environments. With cyber threats becoming more sophisticated, professionals trained in computer forensics are increasingly sought after. By enrolling, you position yourself at the forefront of a booming industry, prepared to tackle challenges that impact businesses and individuals globally. Embrace this chance to enhance your career prospects and contribute to a safer digital world.
    Qs World University Rankings

    Universidades colaboradoras

    Para qué te prepara
    The Course in Computer Forensic Expertise equips you with the skills to effectively identify, collect, and preserve digital evidence. You'll learn to analyse complex data and trace cyber incidents, enhancing your ability to tackle digital threats. The course provides practical knowledge for conducting thorough investigations and generating detailed reports, enabling you to support legal and organisational processes in addressing digital security challenges.
    Objetivos
    - To understand the fundamental principles of computer forensics and its importance in cybersecurity. - To identify and analyse digital evidence using industry-standard forensic tools and methodologies. - To develop skills in preserving the integrity of digital evidence for legal proceedings. - To learn how to conduct thorough investigations of cyber incidents and security breaches. - To enhance your ability to create detailed forensic reports for stakeholders and legal authorities. - To explore the ethical and legal considerations in the practice of computer forensics. - To gain proficiency in recovering data from damaged or compromised digital devices.
    A quién va dirigido
    The Course in Computer Forensic Expertise is designed for professionals and graduates in the IT and cybersecurity sectors who are eager to enhance or update their knowledge in computer forensics. This course offers supplementary training, ideal for those looking to deepen their understanding of digital investigation without being a prerequisite for professional practice.
    Salidas Profesionales
    - Digital forensic analyst in law enforcement agencies - Cybersecurity consultant for private firms - Expert witness in legal cases involving cybercrime - IT security specialist for government organisations - Corporate investigator for data breaches - Cyber incident responder for financial institutions - E-discovery specialist for legal firms
    Temario

    UNIT 1. COMPUTING, CONNECTIVITY, AND THE INTERNET

    1. Computing
      1. - Basic concepts
    2. Components of a computer system
    3. Basic structure of a computer system
    4. Central processing unit in a computer system
      1. - Structure
    5. Common peripherals: Connectivity
    6. Operating system
    7. Internet
    8. Internet connectivity
      1. - Types of networks
      2. - Wireless network

    UNIT 2. FUNDAMENTALS OF COMPUTER FORENSICS AND DIGITAL FORENSICS

    1. Concept of computer forensics
    2. Objectives of computer forensics
    3. Uses of computer forensics
    4. The role of the computer expert
    5. Computer forensic laboratory
    6. Digital evidence
      1. - Volatile and non-volatile evidence
      2. - Evidence labeling
    7. Chain of custody

    UNIT 3. CYBERCRIME

    1. Computer crime
      1. - Main characteristics of computer crime
    2. Types of computer crime
    3. Cybercrime

    UNIT 4. ETHICAL HACKING

    1. What is ethical hacking?
      1. - Hacker ethics
      2. - Values of hacker ethics
      3. - Phases of ethical hacking
      4. - Types of ethical hacking
    2. Legal aspects of ethical hacking
      1. - Ethical hacking process
      2. - Code of ethics and certification
    3. Ethical hacker profiles
      1. - Black hat hacker
      2. - White hat hacker
      3. - Gray hat hackers
      4. - Hacktivism
    4. Vulnerability testing
      1. - Steps to set up a pentesting lab
    5. Sniffing
    6. Types of security testing in web environments
      1. - Identifying proxy mechanisms used
      2. - Enumeration of valid hosts
      3. - Web Server Profiles

    UNIT 5. FORENSIC ANALYSIS

    1. Forensic analysis
    2. Stages of forensic analysis
      1. - Preliminary study
      2. - Data acquisition
      3. - Analysis and investigation
      4. - Presentation and preparation of the expert report
    3. Types of forensic analysis
    4. Requirements for forensic analysis
    5. Main issues

    UNIT 6. DATA SUPPORT

    1. Data acquisition: importance in digital forensic analysis
    2. OSI Model
    3. File recovery
      1. - Dynamics of file deletion
      2. - Requirements for file and data recovery
      3. - Key tools for data recovery
      4. - Recovery process
    4. File analysis
      1. - Signature identification
      2. - Documents
      3. - Graphics and multimedia files
      4. - Executable files

    UNIT 7. INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS)

    1. The information society
    2. What is information security?
    3. Importance of information security
    4. Fundamental principles of information security: confidentiality, integrity, and availability
      1. - Principle of confidentiality
      2. - Principle of integrity
      3. - Principle of availability
    5. Description of security risks
    6. Selection of controls
    7. Success factors in information security
    8. Benefits of an information security system
    Titulación
    Claustro

    Rafael Marín Sastre

    Ingeniero técnico en informática de sistemas por la Universidad de Granada (UGR).  

    Apasionado de la informática y de las nuevas tecnologías, cuenta con 10 años de experiencia y vocación en el ámbito TIC y la programación de software. Es experto en desarrollo web, programación de aplicaciones, análisis de datos, big data, ciberseguridad y diseño y experiencia de usuario (UX/UI). 

    Alan Sastre

    Ocupa el puesto de CTO (Chief Technology Officer) y formador. Diseña e imparte formación en diferentes áreas como desarrollo web, bases de datos, big data, business intelligence y ciencia de datos. Además, trabaja diaramente con las tecnologías del ecosistema Java, C# y Phyton.

    Dani Pérez Lima

    Global IT support manager de una multinacional con más de 20 años de experiencia en el mundo IT, además de un apasionado de la virtualización de sistemas y de la transmisión de conocimiento en el ámbito de la tecnología.

    José Domingo Muñoz Rodríguez

    Ingeniero informático, profesor de secundaria de ASIR y coorganizador de OpenStack Sevilla con dilata experiencia en sistemas GNU/Linux. Administra clouds públicos y gestiona un cloud privado con OpenStack.

    Juan Benito Pacheco

    Como tech lead, ayuda a organizaciones a escalar sus servicios e infraestructura. Lleva más de 5 años programando tanto en front-end como back-end con JavaScript, Angular, Python o Django, entre otras tecnologías.

    Juan Diego Pérez Jiménez

    Profesor de Ciclos Formativos de Grado Superior de Informática. Más de 10 años creando páginas web y enseñando cómo hacerlas, cómo usar bases de datos y todo lo relacionado con la informática.

    Solicitar información