Main Training Topic

  • IS and Digital Forensics

Course Code

  • 08/TP/ISDF/03

Training Type

  • Practical Workshop
Upcoming Events

Others various programs

Recent and Upcoming Events

  • Follow Us

CFI-Computer Forensics Investigation

If there is a computer on the premises of a crime scene, the chances are very good that there is valuable evidence on that computer

Accidental/planned destruction of data, hardware failure or cyber attack can happen anytime and organization may be called upon respond, investigation and escalate the analysis to a formal investigation.

Computer forensics is a branch of forensic science pertaining to legal evidence found in computer and digital storage mediums. It defines as preservation, identification, extraction, documentation and interpretation of computer media for evidentiary and/or root cause analysis.

Computer crime are rising every day, Fraud, identity theft, defamation, copyright, gambling, child pornography, anti-spamming and terrorist, etc.

Information is potentially one of an organization most valued asset and organization needs to able to protect those assets .One of the most common use of computer forensics is finding out what employees are doing during and none working hours.

They may involve of destroying of stealing valuable inside company information, or sharing that information with competitors or taking client from the company to start up a business. This program is designed to introduce you the fundamental of computer crime and investigation concept.

What will you take away?

  • X-way forensics 1 month full license
  • Demo software which present during the presentation
  • Free advisory section
  • Introduction
  • Operation system
  • Investigation technique
  • Analysis
  • Forensics Data Recovery Tools M
  • Mobile Forensic.
  • Anti-Forensics
: Open to members of public and private security professionals

  • Senior officers from government & not-for- profit sector
  • Non-IT executives who need to understand computer crime and forensics analysis
  • GMs, Profit-Centre Managers who have assumed security/IT
  • Sales & Marketing Managers
  • Corporate Attorneys / Legal Professionals
  • Engineers / Technical Managers
  • Product & Marketing Managers
  • Project Managers
  • IT manager
  • Security supervisor
  • System administrator


Through the use of practical examples, case studies and exercises you will learn the different types of security problems that are faced in the protection of organizations computer systems and its impact on the organization. We ensure at the very end of this seminar, with your "valued-added" knowledge coupled with your functional skills set will be a key asset to any organization.

None. Basic Computer literacy preferred.

essay writing service


The consultants commitment to a project is highly professional. We would be more than pleased to recommend his services without hesitation.

Shammi from Messe Frankfurt

Read more››

Copyright © 2019 Lorin. All Rights Reserved.

show bar
November 12, 2019
essay writer
term paper
term paper writing
term paper writing service
research paper help