Digital Forensics Essentials (DFE) (SF)
                                Training Provider: NTUC LEARNINGHUB PTE. LTD.                            
                            
                            
                                Course Reference: TGS-2024045967                            
                            
                                                    
                                S$600                            
                                                            
                                    Original: S$1,200                                
                                
                                    Save S$600                                
                                                    About This Course
•	Define different types of digital evidence.
•	Define different types of disk drives and file systems.
•	Learn to use commonly used forensic tools.
•	Learn to collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents.
What You'll Learn
This is a 2-day course which introduces students to the cyber security forensics domain. Candidates will gain knowledge and skills in the Computer Forensics Investigation Process, different types of data devices and storages, procedures to acquire, preserve and maintain integrity of evidence to be used in the court of law. Candidates will also be introduced to some of the commonly used forensic tools.
Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors. Cyber Security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams.
                                Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors. Cyber Security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams.
Entry Requirements
Candidates with basic knowledge in information technology
Course Details
                                    
                                    
                                    
                                    
                                    
                                    
                                        Back to All Courses
                                    
                                    
                                    
                            
                                        Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.
                                    
                                More Courses from NTUC LEARNINGHUB PTE. LTD.
                                        •	Evaluate organisational requirements and business needs for cloud solutions 
•	Evaluate new a...                                    
                                    
                                    
                                    
                                    
                                
                                        •	Evaluate organisational requirements and business needs for cloud solutions 
•	Evaluate new a...                                    
                                    
                                    
                                    
                                    
                                
                                        •	Discuss foundation concepts of cybersecurity principles.
•	Explain how organizations respond ...