SlideShare a Scribd company logo
1 of 4
Download to read offline
CERTIFIED LEAD
FORENSICS EXAMINER

ANSI Accredited Program
PERSONNEL CERTIFICATION
#1003

MASTERING THE IMPLEMENTATION AND MANAGEMENT OF COMPUTER FORENSICS
PROCESSES
SUMMARY
This five-day intensive course enables the participants to develop the necessary expertise in mastering the computer
forensics processes as specified in CLFE certification. Participants will gain a thorough understanding of fundamental
computer forensics, based on the best practices used to implement the forensics evidence recovery and analytical
processes. The CLFE certification focuses on core skills required to collect and analyze data from Windows, Mac OS X,
Linux computer systems, as well as from mobile devices.

COURSE AGENDA

DURATION: 5 DAYS

DAY 1
Introduction to scientific principles of
Computer Forensics operations

DAY 2
The computer and operating structure

▶▶ Scientific principles of computer forensics
▶▶ Introduction to computer forensics process approach
▶▶ The analysis and implementation of the fundamental
operations

▶▶ Identification and selection of the characteristics of
the computer structure
▶▶ Identification of peripherals and other components
▶▶ Understanding the operating systems
▶▶ Extraction and analysis of the file structure

▶▶ Preparation and execution of forensics procedures
and operations

DAY 3
Forensics of networks and mobile devices
▶▶ Understanding the network, cloud and virtual
environments
▶▶ Generic methods for data examination in a virtual
environment
▶▶ Examination of a cell phone or tablet
▶▶ Enumeration of cell phones and tablets needed for
forensics examination
▶▶ Storage of information in mobile devices

DAY 5

DAY 4
Computer Forensics tools and
methodologies
▶▶ Enumeration and examination of the computer
hardware and software
▶▶ Determination and testing of corrective measures
▶▶ Analysis and selection of the best procedures for
computer forensics operation
▶▶ Discovery, documentation and return of the evidence
on-site
▶▶ Analyzing and applying the contextual parameters

ANSI Accredited Certification Exam
www.pecb.org
WHO SHOULD ATTEND?
▶▶
▶▶
▶▶
▶▶
▶▶
▶▶
▶▶
▶▶

Computer Forensic specialists
Electronic data analysts
Specialists in computer search and evidence recovery
Professionals working or interested in law enforcement
Professionals willing to advance their knowledge in computer forensic analysis
Members of an information security team
Expert advisors in information technology
Individuals responsible for examining media to extract and disclose data

LEARNING OBJECTIVES
▶▶ To ensure that the CLFE can protect him or herself against injury, threat to credibility and protect the integrity of the
examined media throughout the computer forensics operation
▶▶ To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action
to be followed in order to achieve the goal of the operation
▶▶ To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the
presence of certain ports to the actual or eventual presence of a media containing information to be examined
▶▶ To ensure that the CLFE has a clear knowledge where the information can be found on an electronic media or
bit-stream image of a media, it would be operating the systems or user information, actual deleted or hidden
information
▶▶ To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence
located on a network, in the cloud or in a virtual environment
▶▶ To ensure that the CLFE can conduct a basic, yet forensically sound examination of a cell phone or tablet
▶▶ To ensure that the CLFE can use efficiently the tools (software, hardware and supplies) of the field examination kit
for a better goal achievement of the computer forensics operation
▶▶ To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and
forensically sound manner

ANSI Accredited Program
PERSONNEL CERTIFICATION
#1003

www.pecb.org/accreditation

www.pecb.org
ANSI Accredited Program
PERSONNEL CERTIFICATION
#1003

www.pecb.org/accreditation

EXAMINATION
▶▶ The “Certified Lead Forensics Examiner” exam fully meets the requirements of the PECB Examination and
Certification Program (ECP). The exam covers the following competence domains:

1

DOMAIN 1: SCIENTIFIC PRINCIPLES OF COMPUTER FORENSICS
Main Objective: To ensure that the CLFE can protect himself against injury, threat to credibility and protect the
integrity of the examined media throughout the computer forensics operation

2

DOMAIN 2: COMPUTER FORENSICS OPERATIONS FUNDAMENTALS
Main Objective: To ensure that the CLFE can conduct a complete computer forensics operation and determine the
course of action to be followed to achieve the goal of the operation

3

DOMAIN 3: FORENSICS: COMPUTER HARDWARE STRUCTURE
Main Objective: To ensure that the CLFE can safely handle computers, extract and install peripherals and
components, relate the presence of certain ports to the actual or eventual presence of a media containing
information to be examined

4

DOMAIN 4: FORENSICS: FORENSICS: OPERATING SYSTEMS AND FILE STRUCTURE
Main Objective: To ensure that the CLFE have a clear knowledge where information can be found on an electronic
media or bit-stream image of a media, would it be operating system’s or user information or actual, deleted or
hidden information

5

DOMAIN 5: FORENSICS OF NETWORK, CLOUD AND VIRTUAL ENVIRONMENTS
Main Objective: To ensure that the CLFE can conduct a forensically sound examination, extraction and
preservation of evidence located on a network, in the cloud or in a virtual environment

6

DOMAIN 6: FORENSICS OF CELL PHONES AND TABLETS
Main Objective: To ensure that the CLFE can conduct a basic but forensically sound examination of a cell phone
or a tablet

7

DOMAIN 7: COMPUTER FORENSICS OPERATION TOOLS AND SOFTWARE
Main Objective: To ensure that the CLFE can conduct a basic but forensically sound examination of a cell phone
or a tablet

8

DOMAIN 8: FORENSICS: EXAMINATION, ACQUISITION AND PRESERVATION OF ELECTRONIC EVIDENCE
Main Objective: To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered,
standard and forensically sound manner
▶▶ The “Certified Lead Forensics Examiner” exam is available in different languages, including English, French,
Spanish and Portuguese
▶▶ Duration: 3 hours
▶▶ For more information about the exam, please visit: www.pecb.org

www.pecb.org
CERTIFICATION
▶▶ A certificate of “Certified Lead Forensics Examiner” will be issued to those participants who successfully pass the
exam and comply with all the other requirements related to this credential:
Credential

Exam

Professional
Experience

Education

Other
Requirements

Certified Lead
Forensics
Examiner

Certified Lead
Fo­ensics
r
Examiner Exam

Two years
One year of field
experience in
Computer Forensics

At least
Secondary School

Signing the
PECB
code of ethics

GENERAL INFORMATION
▶▶
▶▶
▶▶
▶▶

Certification fees are included in the exam price
Participant manuals contains over 450 pages of information and practical examples
A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants
In case of failure of the exam, participants are allowed to retake it for free under certain conditions

For additional information,
please contact us at info@pecb.org
ANSI Accredited Program
PERSONNEL CERTIFICATION
#1003

www.pecb.org/accreditation

www.pecb.org

More Related Content

Viewers also liked

Pedro alecrim
 Pedro alecrim Pedro alecrim
Pedro alecrimEBSC carmo
 
Rustic Cuff Fall/Winter 2013 Collection
Rustic Cuff Fall/Winter 2013 CollectionRustic Cuff Fall/Winter 2013 Collection
Rustic Cuff Fall/Winter 2013 CollectionJanzenDesigns
 
Historia de la administración
Historia de la administraciónHistoria de la administración
Historia de la administraciónAlicialm1
 
Cadbury’s operations in India.
Cadbury’s operations in India.Cadbury’s operations in India.
Cadbury’s operations in India.AJ Raina
 
Principle of teaching and the learning language
Principle of teaching and the learning languagePrinciple of teaching and the learning language
Principle of teaching and the learning languagejanehbasto
 

Viewers also liked (6)

Work diary sequencing
Work diary   sequencingWork diary   sequencing
Work diary sequencing
 
Pedro alecrim
 Pedro alecrim Pedro alecrim
Pedro alecrim
 
Rustic Cuff Fall/Winter 2013 Collection
Rustic Cuff Fall/Winter 2013 CollectionRustic Cuff Fall/Winter 2013 Collection
Rustic Cuff Fall/Winter 2013 Collection
 
Historia de la administración
Historia de la administraciónHistoria de la administración
Historia de la administración
 
Cadbury’s operations in India.
Cadbury’s operations in India.Cadbury’s operations in India.
Cadbury’s operations in India.
 
Principle of teaching and the learning language
Principle of teaching and the learning languagePrinciple of teaching and the learning language
Principle of teaching and the learning language
 

Similar to Certified Lead Forensics Examiner - Four Page Brochure

Certified Lead Forensics Examiner - Two Page Brochure
Certified Lead Forensics Examiner - Two Page BrochureCertified Lead Forensics Examiner - Two Page Brochure
Certified Lead Forensics Examiner - Two Page BrochurePECB
 
Certified Lead Forensics Examiner - One Page Brochure
Certified Lead Forensics Examiner - One Page BrochureCertified Lead Forensics Examiner - One Page Brochure
Certified Lead Forensics Examiner - One Page BrochurePECB
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxbagotjesusa
 
PeopleCert ExamShield Technical Details.pdf
PeopleCert ExamShield Technical Details.pdfPeopleCert ExamShield Technical Details.pdf
PeopleCert ExamShield Technical Details.pdfIndranighosh46
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Duane Rigsby
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfGnanavi2
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...CRAW CYBER SECURITY PVT LTD
 
Getting started in digital forensics
Getting started in digital forensicsGetting started in digital forensics
Getting started in digital forensicsInfosec
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 

Similar to Certified Lead Forensics Examiner - Four Page Brochure (20)

Certified Lead Forensics Examiner - Two Page Brochure
Certified Lead Forensics Examiner - Two Page BrochureCertified Lead Forensics Examiner - Two Page Brochure
Certified Lead Forensics Examiner - Two Page Brochure
 
Certified Lead Forensics Examiner - One Page Brochure
Certified Lead Forensics Examiner - One Page BrochureCertified Lead Forensics Examiner - One Page Brochure
Certified Lead Forensics Examiner - One Page Brochure
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
 
PeopleCert ExamShield Technical Details.pdf
PeopleCert ExamShield Technical Details.pdfPeopleCert ExamShield Technical Details.pdf
PeopleCert ExamShield Technical Details.pdf
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
 
Getting started in digital forensics
Getting started in digital forensicsGetting started in digital forensics
Getting started in digital forensics
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
GregoryBeynon resume
GregoryBeynon resumeGregoryBeynon resume
GregoryBeynon resume
 
MOSES_NTCV
MOSES_NTCVMOSES_NTCV
MOSES_NTCV
 
ISA.pdf
ISA.pdfISA.pdf
ISA.pdf
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
it_experience
it_experienceit_experience
it_experience
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Certified Lead Forensics Examiner - Four Page Brochure

  • 1. CERTIFIED LEAD FORENSICS EXAMINER ANSI Accredited Program PERSONNEL CERTIFICATION #1003 MASTERING THE IMPLEMENTATION AND MANAGEMENT OF COMPUTER FORENSICS PROCESSES SUMMARY This five-day intensive course enables the participants to develop the necessary expertise in mastering the computer forensics processes as specified in CLFE certification. Participants will gain a thorough understanding of fundamental computer forensics, based on the best practices used to implement the forensics evidence recovery and analytical processes. The CLFE certification focuses on core skills required to collect and analyze data from Windows, Mac OS X, Linux computer systems, as well as from mobile devices. COURSE AGENDA DURATION: 5 DAYS DAY 1 Introduction to scientific principles of Computer Forensics operations DAY 2 The computer and operating structure ▶▶ Scientific principles of computer forensics ▶▶ Introduction to computer forensics process approach ▶▶ The analysis and implementation of the fundamental operations ▶▶ Identification and selection of the characteristics of the computer structure ▶▶ Identification of peripherals and other components ▶▶ Understanding the operating systems ▶▶ Extraction and analysis of the file structure ▶▶ Preparation and execution of forensics procedures and operations DAY 3 Forensics of networks and mobile devices ▶▶ Understanding the network, cloud and virtual environments ▶▶ Generic methods for data examination in a virtual environment ▶▶ Examination of a cell phone or tablet ▶▶ Enumeration of cell phones and tablets needed for forensics examination ▶▶ Storage of information in mobile devices DAY 5 DAY 4 Computer Forensics tools and methodologies ▶▶ Enumeration and examination of the computer hardware and software ▶▶ Determination and testing of corrective measures ▶▶ Analysis and selection of the best procedures for computer forensics operation ▶▶ Discovery, documentation and return of the evidence on-site ▶▶ Analyzing and applying the contextual parameters ANSI Accredited Certification Exam www.pecb.org
  • 2. WHO SHOULD ATTEND? ▶▶ ▶▶ ▶▶ ▶▶ ▶▶ ▶▶ ▶▶ ▶▶ Computer Forensic specialists Electronic data analysts Specialists in computer search and evidence recovery Professionals working or interested in law enforcement Professionals willing to advance their knowledge in computer forensic analysis Members of an information security team Expert advisors in information technology Individuals responsible for examining media to extract and disclose data LEARNING OBJECTIVES ▶▶ To ensure that the CLFE can protect him or herself against injury, threat to credibility and protect the integrity of the examined media throughout the computer forensics operation ▶▶ To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action to be followed in order to achieve the goal of the operation ▶▶ To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the presence of certain ports to the actual or eventual presence of a media containing information to be examined ▶▶ To ensure that the CLFE has a clear knowledge where the information can be found on an electronic media or bit-stream image of a media, it would be operating the systems or user information, actual deleted or hidden information ▶▶ To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence located on a network, in the cloud or in a virtual environment ▶▶ To ensure that the CLFE can conduct a basic, yet forensically sound examination of a cell phone or tablet ▶▶ To ensure that the CLFE can use efficiently the tools (software, hardware and supplies) of the field examination kit for a better goal achievement of the computer forensics operation ▶▶ To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and forensically sound manner ANSI Accredited Program PERSONNEL CERTIFICATION #1003 www.pecb.org/accreditation www.pecb.org
  • 3. ANSI Accredited Program PERSONNEL CERTIFICATION #1003 www.pecb.org/accreditation EXAMINATION ▶▶ The “Certified Lead Forensics Examiner” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). The exam covers the following competence domains: 1 DOMAIN 1: SCIENTIFIC PRINCIPLES OF COMPUTER FORENSICS Main Objective: To ensure that the CLFE can protect himself against injury, threat to credibility and protect the integrity of the examined media throughout the computer forensics operation 2 DOMAIN 2: COMPUTER FORENSICS OPERATIONS FUNDAMENTALS Main Objective: To ensure that the CLFE can conduct a complete computer forensics operation and determine the course of action to be followed to achieve the goal of the operation 3 DOMAIN 3: FORENSICS: COMPUTER HARDWARE STRUCTURE Main Objective: To ensure that the CLFE can safely handle computers, extract and install peripherals and components, relate the presence of certain ports to the actual or eventual presence of a media containing information to be examined 4 DOMAIN 4: FORENSICS: FORENSICS: OPERATING SYSTEMS AND FILE STRUCTURE Main Objective: To ensure that the CLFE have a clear knowledge where information can be found on an electronic media or bit-stream image of a media, would it be operating system’s or user information or actual, deleted or hidden information 5 DOMAIN 5: FORENSICS OF NETWORK, CLOUD AND VIRTUAL ENVIRONMENTS Main Objective: To ensure that the CLFE can conduct a forensically sound examination, extraction and preservation of evidence located on a network, in the cloud or in a virtual environment 6 DOMAIN 6: FORENSICS OF CELL PHONES AND TABLETS Main Objective: To ensure that the CLFE can conduct a basic but forensically sound examination of a cell phone or a tablet 7 DOMAIN 7: COMPUTER FORENSICS OPERATION TOOLS AND SOFTWARE Main Objective: To ensure that the CLFE can conduct a basic but forensically sound examination of a cell phone or a tablet 8 DOMAIN 8: FORENSICS: EXAMINATION, ACQUISITION AND PRESERVATION OF ELECTRONIC EVIDENCE Main Objective: To ensure that the CLFE can justify the way an artifact was acquired or left behind in an ordered, standard and forensically sound manner ▶▶ The “Certified Lead Forensics Examiner” exam is available in different languages, including English, French, Spanish and Portuguese ▶▶ Duration: 3 hours ▶▶ For more information about the exam, please visit: www.pecb.org www.pecb.org
  • 4. CERTIFICATION ▶▶ A certificate of “Certified Lead Forensics Examiner” will be issued to those participants who successfully pass the exam and comply with all the other requirements related to this credential: Credential Exam Professional Experience Education Other Requirements Certified Lead Forensics Examiner Certified Lead Fo­ensics r Examiner Exam Two years One year of field experience in Computer Forensics At least Secondary School Signing the PECB code of ethics GENERAL INFORMATION ▶▶ ▶▶ ▶▶ ▶▶ Certification fees are included in the exam price Participant manuals contains over 450 pages of information and practical examples A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants In case of failure of the exam, participants are allowed to retake it for free under certain conditions For additional information, please contact us at info@pecb.org ANSI Accredited Program PERSONNEL CERTIFICATION #1003 www.pecb.org/accreditation www.pecb.org