# Secure & Safeguard the Data!  

Digital Forensics Solutions under one roof

#OSINT Technical Workshop

OPEN SOURCE INTELLIGENCE

5 Days Technical workshop
21st March-25th March 2022,
Dubai, UAE

Dubai | | March 21-25, 2022

tra Course level: Intermediate

cal March 21-25, 2022

map Dubai

eng English language

tra  Technical Workshop materials

Description

This course focuses on the ability to gather information on people, groups, or companies from the Internet. In addition to using advanced web searches and other websites, this course will be leveraging the tools available to look ‘under the surface’ of the internet, accessing data through the database, deep web, various data collection methods, and others. The course is hands-on and will teach a range of skills from staying anonymous, setting up false online identities, extracting data without using a website, collating the data using various free and open-source tools, and graphing and visualizing data both historical and in real-time.

This course will provide participants with the skills needed to carry out highly advanced techniques of searching the Internet whilst remaining anonymous. With this course, participants will understand and practically apply various techniques to gather underlaying data and how to properly interpret it. At the end of the course, all participants will be given an exam and an official certificate for attending the course.

This class is suitable for various roles, levels of knowledge, previous Technical workshops, experience, and field of interest and can be attended by IT professionals, IT security or cybersecurity specialist, digital forensics and incident response personnel, law enforcement people, employees of human resources, corporate security, headhunters or journalist.   

Course Objectives:

  • To equip the participants with the skills to carry out highly advanced techniques of searching the Internet whilst remaining anonymous
  • To enable the participants to be familiar with specialist software tools and understand the results
  • The introduce little known online resources
  • For the participant to understand and practically apply various techniques to directly talk to the underlying databases of various site

Prerequisites:

The participants should have a basic understanding of computers, using Windows operating systems, and be comfortable with online research.

For more information, drop us a message on

Basic of Digital Forensics

We understand the way cyber security has become a crucial part of any organization in today’s fast paced world and so the need to have trained Digital Forensics professionals is imperative to secure & safeguard the Data!  

Following the same, we along with our partners have specialization in the field of digital forensics solutions & services. As definition goes, we offer an extensive array of services, from consulting to education to equipping forensics laboratories, always keeping up with the latest tools & techniques.

Digital Forensics Investigation Process

basics of digital forensics chart

We cater to all the Branches of Digital Forensics like 

* Computer Forensics
* Mobile devices forensics
* Internet forensics
* Network forensics
* Database forensics 

EDUCATION

Our Partner have their own training centre for forensic investigators. Apart from that we do provide number of specialized training courses offered by forensics equipment manufacturers, with an official vendor (tool based) certificate like Access Data, Belkasoft, Magnet Forensics, Oxygen Forensics etc. Also, we do have general & specific courses and these courses are covering, from basic digital forensics concepts and procedures to advanced topics for experienced investigators.

We offer a wide range of management, leadership and skill-based courses tailored to meet the client’s needs. The course syllabus is tailored to meet the client’s specifications with extensive hands-on practical’s and professional Digital Forensics certification. We work closely with the client to adjust the content and duration of the course according to their specific requirements.

APPROACH AND METHODOLOGY

In order to ensure excellent experience and workshop environment, we have a fully equipped classroom in which workshop courses are held. Each course can be attended by minimum 3 participants and maximum 15 participant’s .If required by client, we are able to deliver tailor made courses at client’s premises also .Participant attendance is carefully monitored and after completing the course each participant is awarded with appropriate certificate. 

95% of cybersecurity breaches are caused by human error. (Cybint)

$170.4 billion in 2022

The worldwide information security market is forecast to reach. (Gartner)

E-LEARNING

(General, Specific, Tool Based Digital Forensics Courses)

Our goal is to provide exceptional, up to date courses, that can be benefited from all over the world!

Our partner's vast experience working with legal entities as well as with law enforcement, on a diversity of different criminal cases allowed them to recognize specific needs for supplementary education and improvement of knowledge and skills. Therefore, we have created an e-learning platform with courses specifically designedcreated for judges, lawyers, public prosecutors, and IT professionals and law enforcement officials.

E learning Courses are designed as full-text reading courses and are available to participants to complete for several months. Each course consists of several chapters, each followed by a short quiz. At the end of the course, participants will go through a final assessment, a case study, in order to receive a “Certificate of Completion” with CPD, CPE, CLE points.

E-LEARNING COURSES

Whether you're new to the field, a seasoned professional, or an experienced leader in the industry, our course will deliver the knowledge you need, along with relevant & practical hands-on skills you can use immediately.

We offer a number of workshop programs in the field of digital forensics, which are not related to specific product but with the aim to cover various principles and procedures of digital forensic. These workshops are enhanced and modified on a regular basis, in line with the latest developments in digital forensic and computer security. This approach offers a comprehensive overview of all the digital forensics and enables the attendees to acquire knowledge for further independent work.

ONGOING E-LEARNING

  • Fundamentals of digital forensics for lawyers and judges
  • Digital forensics for lawyers and judges - intermediate level
  • Cryptocurrencies and dark web for lawyers and judges
  • Fundamentals of digital forensics for private sector
  • Cryptocurrencies and Dark Web investigations
  • Fundamentals of digital forensics for LE
  • Password Management

General Courses

Computer Hardware /
Duration 1-2 days

The goal of this workshop is to provide general knowledge of PC components that are the subject of every investigation in the field of digital forensics. Having a good understanding of components that can be found in desktop computers, servers, laptops and all peripherals are must for every digital forensics investigator. A series of hands on exercise, handle, dismantle and PC component. 

Digital Forensics /
Duration 3-5 days

It’s a course that presents fundamentals of computer forensics. Understanding forensics artifacts and advanced forensic capabilities is an essential component of information security .This workshop is designed for computer forensics professionals .It guides students   through fundamental workshop tasks with close assistance of coaches, with student to teacher ratio not greater than 8:1. 

Mobile Forensic /
Duration 3-5 days

This course can be Basic /intermediate/ advanced as per client requirements. It covers all the essentials you will need to get started in mobile forensics using various tools. The information provided is extensive and covers all aspects of SIM Cards, Memory Cards, and feature phone, GPS Navigation device, Smartphones, IOS application, Android application etc. Enroll now for Mobile Forensic Workshop.

Linux Forensic /
Duration 5 days

This course will provide participants the knowledge of Linux operating system, comparison with Microsoft windows operating system, Linux distributions, Basic commands and system variable .Participants will learn how to perform forensic steps and how to collect and properly analyze data under Linux operating system .Course will cover essential components and main areas of the operating system (LINUX kernel essentials, Service start up, Scheduled jobs, Processes). Finally participants will learn about the concepts of forensic analysis Linux – based system.

Internet Forensic /
Duration 4 days

This program is designed to provide participants with basic knowledge of the internet, computer networks, web browsers, email, cloud computing and wireless technology along with forensic analysis of internet artefacts. Through a combination of lectures , instructor led  and independent  hands on practical  exercises, participants will learn  the underlying principles  of computer networks and enhance  their ability to conduct  forensic examinations  of the popular software’s clients used on the internet  today, for both law and un law purposes. 

Mac Forensic /
Duration 5 days

This course will provide participants with the basic knowledge of Mac forensics. The course starts with Apple and Mac history, presentation of course with purpose, methodology and contents. It is important to examine Mac Data. The course will cover HFS +   and MAC OS volume structure. Participants will learn to examine Macintosh disks and disk images and how to examine encrypted disk images. They will also become familiar with MAC OS X operating system artifacts, other OS settings and user specific Mac OS X operating system artifacts.

Triage Procedures /
Duration 5 days

Triage is the process of reviewing data to determine the appropriate action based on the severity of the situation and the importance or relevance of the data. In this course, participants will learn all about triage procedures, from arriving from the crime scene to the complete triage data on the target machine in just few minutes. The aforementioned skills are critically important in situations when time is the essence. Participants will also learn how to work with the most popular tools for digital forensic evidence triage. Join now for Triage Procedures Workshop.

Window Forensic /
Duration 5 days

The program is designed to provide participants the detailed study of windows operating system. This will be done through a variety of lectures, instructor-led and independent on practical exercise and independent laboratory activities. Participants will study the windows operating system in more detail and more specifically dealing with critical forensic focus. This program will focus on how the windows operating system works “under the hood” so that participants have a better understanding of how various operating system artifacts are created.

Live Data Forensics /
Duration 5 days

This course will give participants an insight into the domain of live data forensics, including memory data from a running machine. The course starts with hand overview of live data forensic concepts and their relevance. The main objective is to show how to acquire RAM from running computer and how to analyze it thoroughly, how to process Windows, Linux or a MAC system, how to analyze network traffic, open ports, established connections and system process. Furthermore there is a section covering  malware analysis  from a RAM dump.

68% of business leaders feel their cybersecurity risks are increasing. (Accenture)

CONSULTING

Consulting services, in the field of digital forensics, offered by us are very efficient, customized and personalized support to the customers whenever and wherever they need the most!

We support and conduct investigations for the public sector (military, government, police, special task forces, law enforcements) and private sector (corporations/IT professionals in corporations and small businesses). Clients often use our consulting services in complex investigations when they deal with complex problems or when they need help with advanced forensic tools.

This may also include construction of laboratories, training and certification of experts and investigative procedures simulation.

DIGITAL FORENSICS INVESTIGATIONS PROCESS

We take any sort of cases ranging from simple dead box analysis to online investigations, including car, mobile and drone forensics. Our consultants have access to all renowned forensic tools and upon a completed forensic investigation, clients get a detailed report with all necessary documentation. Our consultants are trained digital forensics examiners and are trainers themselves and in addition, some of them have a long history and experience in being a part of law enforcement.

DIGITAL FORENSICS LAB SETUP & MANAGEMENT

Our partners have extensive experience in designing, equipping and setting up digital forensics laboratories for different government agencies and law enforcement. 

In line with the clients budget and requirements, we will suggest the best possible solution, deliver and set up all the equipment and software along with the project documentation and all relevant technical documentation in accordance with current legislation and latest standards. In addition, we offer ISO lab certifications support, development of standard operating procedures, checklists development and lab optimization in order to get the most out of the hardware, software and human resources.

Tailor made Course

In addition to standard workshop programs presented so far, RNTrust also offers wide range of management and skill based courses that can be tailored to meet the client’s needs . Tailor made courses provide the customer with an opportunity to fully focus on their learning and development needs, specific to their company culture and strategic goals. Our partners can develop a competency – based hands on workshop program that will be ideal for the client specific environment. With interested customer, we can offer specific skills, strategies and appropriate delivery style to achieve the objectives, develop the content, design exercises and activities for active participation and follow up.  Customization also includes adjustment of workshop duration in order to meet client’s goals and expectations.

Specific Course

Based on so many years of experience with providing various courses in the field of Digital forensics, we have developed some specialized course. They were created based on our extensive experience and collaboration with a number of clients who required and requested additional skills to be developed for their experts. At the end of each course, all participants will take an exam and after successful completion will be given an official certificate with CPE points for passing the course.

Few of the courses are:

* Advanced JTAG Mobile Forensic

* Window 10 Forensic

* Network Forensic Basic

* Scripting for Digital Forensic Investigator (SCRIPT)

* Password recovery workshop

* Train the Trainers

* Managing Digital forensic Lab

* Malware Forensics Open Source Intelligence (OSINT)

* WIFI Exploitation

Our Courses

Our vast experience working on a variety of different criminal cases, allowed us to understand needs for specific additional education and improvement of knowledge and skills.

Fundamentals of Digital Forensics for Lawyers and Judges

This course is intended for lawyers, judges and public prosecutors in order to help them understand the basics of digital forensic.

  • legal aspects of the evidence seizure
  • inlab processing
  • different types of evidence
  • extracted data
  • generating reports from different tools
  • exporting evidence to be presented in the court
  • court testimonies

Digital Forensics for Lawyers and Judges-Intermediate Level

This course is intended for lawyers, judges and public prosecutors in order to help them understand the forensic value of evidence from different digital sources. 

  • deeper aspects of computer, mobile,
  • network, and cloud forensics
  • types of evidence
  • evidence forensic value
  • acquiring digital evidence
  • forensic solutions
  • forensic challenges

Cryptocurrencies and Dark Web for Lawyers and Judges

This course is intended for lawyers, judges and public prosecutors in order to help them understand the basics of cryptocurrencies and Dark Web. 

  • difference between Deep and Dark Web
  • basics of Dark Web
  • Tor browser functions
  • fundamentals of cryptocurrencies, blockchain technology, and mining
  • cryptocurrencies wallets

Basic Digital Forensics for IT Professionals

This course is intended for IT professionals in order to help them understand the basics of digital forensic and its implications in a corporate environment. 

  • digital evidence identification and seizure
  • on-site triage
  • in lab processing and in-depth explanation of different types of evidence
  • extracted data
  • generating reports from different tools

# let's Secure Your Business

Book a seat now and boost your Forensic skills

WORKSHOP PROGRAM:

INCIDENT RESPONSE 

DAYS: 5 - days Workshop

COST: $3000 (Exclusive 5% VAT)

Agenda Link

WINDOWS FORENSICS

DAYS: 5 - days Workshop

COST: $3000 (Exclusive 5% VAT)

Agenda Link

NETWORK FORENSICS

DAYS: 5 - days Workshop

COST: $3000 (Exclusive 5% VAT)

Agenda Link

DIGITAL FORENSICS - GENERAL OVERVIEW : A RAPIDLY EVOLVING FIELD OF FRAUD DETECTION

1 Hour Free Webinar

SCHEDULE: Every Wednesday

TIME: 04:00PM (GST)

COST: FREE

**Sessions will be conducted through MS Teams

Agenda Link

FAQ Questions?

Who should attend the course?

The course should attend law enforcement members, digital forensics investigators and others that want to learn how to correctly respond to incidents that involve digital evidence.

Workshop Competencies

Our trainers are experienced consultants in digital forensics department. They are responsible for client education, research and development of forensic tools. All our trainers possess excellent knowledge and workshop experience in relevant tools on the market, such as Guidance Software, Micro Systemation, AccessData, Amped, BlueBear, Cellebrite, Oxygen forensic software and products, which can be confirmed by numerous certificates obtained in the digital forensics field.

Fill your information to download our Digital Forensics Brochure