Digital Forensics Training

EnCase DFIR350

The training enables the digital investigator to interpret evidence found on the computer of a suspect or victim using EnCase and, among others, goes into the operation of Bit-Torrent P2P networks, the operation of Trojan viruses and the operation of several types of email clients.

For whom is this training intended?
The practice-oriented training is meant for experienced computer users (digital investigators and IT security experts), who already have some experience with EnCase and is part of the ‘Expert series’ by OpenText. In almost all computer investigation email and internet traffic will be found. This underlines the necessity to understand its relevance in a digital investigation.

What will you learn during the training?

  • Backgrounds of PTP and BitTorrent.
  • The operation of BitTorrent and the BitTorrent protocol.
  • The operation of the Gnutella P2P network.
  • The operation of the LimeWire and Bearshare programmes.
  • The background and operation of Trojan Viruses.
  • The use of VFS and PDE to identify and analyse Trojans.
  • How to detect and analyse Keyloggers.
  • The operation and use of Windows LIVE messenger.
  • The operation of Internet History and WebCache.
  • Goal, content and indexing of Internet cookie files.
  • Reconstruction of web pages.
  • Construction and analysis of Outlook PST files.
  • The use of Mozilla Firefox.
  • Lotus Notes analysis with EnCase.

This website uses cookies

We find it very important that you are aware of which cookies our website uses and for which purposes. We use Functional Cookies to make our website function properly. In addition, we use Analytics Cookies to analyze the use of our website. We also ask your permission for the placement of cookies from third parties (social media, advertising and analytics partners) with whom we share information. By clicking 'Accept', you accept the placement of the above mentioned cookies. If you click on 'Settings', you will be taken to a page where you can specify which cookies may and may not be placed. Click here for our Privacy Statement.