Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
For the Postgraduate Diploma (PG Dip.) you will study the four modules (60 credits) from the Postgraduate Certificate (PG Cert.) plus an additional three modules (60 credits) from the MA Business of Motorsport Master’s Degree. N.B. The Postgraduate Diploma (PG Dip.) does not include the Executive Project (Dissertation) the final module of the MA.
A light and compassionate guide for parents on the art of creating space in a world where there isn't any and of why it matters. Packed with practical tips for wrangling the chaos and conflicting priorities that come with parenthood, the webinar is aimed at anyone who'd like to regain a little bit of 'me' time in a schedule that revolves around everyone else. Available as a live event and as a recording on request.
Premium Bundle of all Time | Ofqual Regulation + ATHE Awards + CPD Accreditation | Assessment & Tutor Support Included
Premium Bundle of all Time | Ofqual Regulation + ATHE Awards + QLS Endorsement | Assessment & Tutor Support Included
Premium Bundle of all Time | Ofqual Regulation + ATHE Awards + QLS Endorsement | Assessment & Tutor Support Included
https://www.valuex2.com/icagile-business-agility-foundations-certification-training/ https://www.linkedin.com/company/80563537/
https://www.valuex2.com/icagile-business-agility-foundations-certification-training/ https://www.linkedin.com/company/80563537/
Managing Multiple Projects: In-House Training Succeeding in today's competitive marketplace often requires cycle time reduction - reducing the duration of projects and getting results faster. This workshop will address managing multiple projects within the context of program or product management. Are your projects taking longer and longer to complete? Are results less than optimal because of time pressures on resources? Would you like to increase project 'throughout'? Succeeding in today's competitive marketplace often requires cycle time reduction - reducing the duration of projects and getting results faster. This workshop will address managing multiple projects within the context of program or product management. Planning and managing individual projects is challenging. When introducing the real-life limitation of resources and other outside influences into the multi-project environment, those challenges are magnified, and new challenges are introduced. This interactive workshop will position you for immediate action. The goal of this course is to equip you with the necessary knowledge, skills, and techniques so that you can effectively and productively manage multiple projects. What you Will Learn You'll learn how to: Manage stakeholder relationships and expectations Prioritize and sequence multiple projects Manage time and stress within a multiple project environment Effectively manage logical dependencies among projects Optimize the use of resources across multiple projects using concepts from Critical Chain methods Manage risk and communications in a multiple project environment Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Portfolio, program, and project management principles The multiple project environment The MMP Process Model Developing the Multiple Project List Multiple project portfolio management Project selection Project categories and types The multiple project list Multiple Project Logical Dependencies Project dependencies Types of multiple project portfolios Categories of logical dependencies across multiple projects Project priorities in the multiple project schedule Multiple Project Resource Management Multiple project resources and resource management concepts Multiple project resource loading Resource pool and resource database Multiple project resource issues and outsourcing Critical chain resource management, including drum resources and multi-tasking Managing Risk Across Multiple Projects Multiple project risk management process Identifying, assessing, and responding to multiple project risks Critical chain and multiple project risks Risk interrelationship management methods Creating and Executing the Multiple Project Plan The multiple project plan Multiple project scheduling Multiple project budgeting Executing and maintaining the multiple project plan Controlling in the multiple project environment Tools in multiple project management Multiple Project Communications Effective communication in the multiple project environment Common communication barriers Multiple project communications plan Resolving multiple project conflicts Summary and Next Steps What did we learn, and how can we implement this in our work environments?
About this Training Course In our pursuit to discover oil & gas in deeper horizons, wells are often drilled in a HPHT environment. To be considered a HPHT well, the downhole conditions will have pressures in excess of 10,000 psi (69 MPa) and 300° F (150° C). To drill these usually expensive wells successfully, the planning and execution phase has to be of an exceptionally high standard. Therefore, both operator and drilling/service contractor staff must be seamlessly aligned and work as a coherent team to reach and then harness the well objectives. This is particularly important when speciality services such as Managed Pressure Drilling (MPD) are being applied with crews and/or supervisors who are not intricately familiar with complicated well control incidents. As we seek to prevent costly non-productive time, attention will also be paid to enabling technologies like expandable solid tubulars, mud coolers and specialty mud. The 3 full-day course will explain the key characteristics and challenges of HPHT Planning and Well Control. This includes: Differences between HPHT and standard (conventional) wells and what this entails for well design. The challenges unique to HPHT and the impact of Pore Pressure Prediction (PPP). Static and Dynamic Equivalent Mud Density and the factors that influence the ultimate Bottom Hole Pressure (BHP). Control practices such as 'fingerprinting' to identify what's happening downhole. HPHT shut-in procedures and practices. Specific HPHT equipment and drilling tool requirements and advantages of Managed Pressure Drilling (MPD). Well control on/off bottom, bull-heading and dealing with kick-loss situations. Mud management, tolerance on mud properties and challenges in cementing. Case history on emergency control. Drills, team effort, checklists, human factor and 'getting everybody on board'. Training Objectives By the end of this course, participants will be able to: Recognize the main differences in planning/design between HPHT and standard (conventional) wells as well as the challenges that will have to be faced. Explain drilling and tripping operational challenges and practices as well as how to manage these effectively. Identify wellbore breathing (a.k.a. ballooning) and how to safely deal with this within the narrow window for mud density selection. Apply practices of consistent fingerprinting and how to develop procedures for this to benefit the rig team. Measure and understand bottom hole pressure and the effect of influencing factors such as temperature, rotation and flow rate. Understand the critical mud properties to alleviate barite sag, general mud density control techniques and specify the essentials in cementing. Manage losses and low fracture gradients with well bore strengthening methods. Execute sound HPHT shut-in procedures. Understand how MPD can assist in the safe and efficient drilling and hole cleaning of HPHT wells. Understand the use of MPD Influx Management Envelopes. Identify critical Early Kick Detection Systems (EKDS) and HPHT well control equipment. Execute safe secondary well control practices in a H2S environment, bull-heading, on and off bottom and handling of gas at surface, using MGS and hydrate mitigation measures. Target Audience The course is intended for: Office-based staff engaged in HPHT well planning and day-to-day operations Field-based rig staff working as front-line supervisors - from Assistant Drillers to Senior Toolpushers Field-based rig staff working for service companies supporting the execution of HPHT wells (MPD, mud and mudlogging services etc.) Trainer Your expert course leader has over 45 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in the well engineering domain. After being employed in 1974 by Shell, one of the major oil & gas producing operators, he worked as an apprentice on drilling rigs in the Netherlands. After a year, he was sent for his first international assignment to the Sultanate of Oman where he climbed up the career ladder from Assistant Driller, to Driller, to wellsite Petroleum Engineer and eventually on-site Drilling Supervisor, actively engaged in the drilling of development and exploration wells in almost every corner of this vast desert area. At that time, drilling techniques were fairly basic and safety was just a buzz word, but such a situation propels learning and the fruits of 'doing-the-basics' are still reaped today when standing in front of a class. After some seven years in the Middle East, a series of other international assignments followed in places like the United Kingdom, Indonesia, Turkey, Denmark, China, Malaysia, and Russia. Apart from on-site drilling supervisory jobs on various types of drilling rigs (such as helicopter rigs) and working environments (such as jungle and artic), he was also assigned to research, to projects and to the company's learning centre. In research, he was responsible for promoting directional drilling and surveying and advised on the first horizontal wells being drilled, in projects, he was responsible for a high pressure drilling campaign in Nigeria while in the learning centre, he looked after the development of new engineers joining the company after graduating from university. He was also involved in international well control certification and served as chairman for a period of three years. In the last years of his active career, he worked again in China as a staff development manager, a position he nurtured because he was able to pass on his knowledge to a vast number of new employees once again. After retiring in 2015, he has delivered well engineering related courses in Australia, Indonesia, Brunei, Malaysia, China, South Korea, Thailand, India, Dubai, Qatar, Kuwait, The Netherlands, and the United States. The training he provides includes well control to obtain certification in drilling and well intervention, extended reach drilling, high pressure-high temperature drilling, stuck pipe prevention and a number of other ad-hoc courses. He thoroughly enjoys training and is keen to continue taking classes as an instructor for some time to come. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations