Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
8Activity
0 of .
Results for:
No results containing your search query
P. 1
Step by Step - Digital Forensics and Cyber Crime

Step by Step - Digital Forensics and Cyber Crime

Ratings:

4.0

(2)
|Views: 969|Likes:
The dramatic increase in computer-related crime requires Risk Managers, Auditors, Compliance Officers, Corporate Security Personnel and Law Enforcement Agents to understand how to legally obtain electronic evidence stored in computers.

Electronic records such as scomputer network logs, e-mails, word processing files, and ".jpg" picture files increasingly provide the government and corporations with important (and sometimes essential) evidence in criminal and civil cases.

One of the purposes of this instructor led video presentation Masterclass is to provide the above mentioned professionals with systematic guidance that can help them understand some of the issues that arise when they seek electronic evidence in criminal and civil investigations.
The dramatic increase in computer-related crime requires Risk Managers, Auditors, Compliance Officers, Corporate Security Personnel and Law Enforcement Agents to understand how to legally obtain electronic evidence stored in computers.

Electronic records such as scomputer network logs, e-mails, word processing files, and ".jpg" picture files increasingly provide the government and corporations with important (and sometimes essential) evidence in criminal and civil cases.

One of the purposes of this instructor led video presentation Masterclass is to provide the above mentioned professionals with systematic guidance that can help them understand some of the issues that arise when they seek electronic evidence in criminal and civil investigations.

More info:

Published by: CFE International Consultancy Group on Jul 21, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/05/2012

pdf

text

original

 
Jointly Organized By:
ICFE Consultancy Group Pte Ltd
I
nternational
C
ybercrime &
F
orensics
E
xaminers
CSI World Headquarters
“So that others may know the risk”
www.csi-world-hq.org
Tel : (65) 6222 9860 | Fax: (65) 6222 9865 | www.icfe-cg.com | enquiry@icfe-cg.com
 
Step by Step –Digital Forensics and Cyber Crime
1-Day Masterclass
Supported By:
www.icfe-cg.com
19 Nov 2009, Parkroyal Hotel, Kuala Lumpur
Become a
Member of CSI WORLD HEADQUARTERS
for
FREE!
See brochure for more details
UCSI ExtensionSdn Bhd
www.ucsi.edu.my
 
SPECIALLY TAILORED IN-HOUSE TRAINING is now available!
For more information, please contact Ariel Tan at +65 6222 9864 or email ariel@icfe-cg.com 
Tel : (65) 6222 9860 | www.icfe-cg.com | enquiry@icfe-cg.com |Fax: (65) 6222 9865
Course Outline
 The dramatic increase in computer-related crime requires Risk Managers, Auditors , Compliance Ocers, Corporate SecurityPersonnel and Law Enforcement Agents to understand how to legally obtain electronic evidence stored in computers. Electronic records such as computer network logs, e-mails, word processing les, and “.jpg” picture les increasingly provide thegovernment and corporations with important (and sometimes essential) evidence in criminal and civil cases.One of the purposes of this instructor led video presentation Masterclass is to provide the above mentioned professionals withsystematic guidance that can help them understand some of the issues that arise when they seek electronic evidence incriminal and civil investigations
Cyber Crime as We Enter the Twenty-First Century
What Is Cyber Crime? 
What are the basic internal control concepts, and why is Fraud 
Risk 
Management critical to computer control and security important? How Does Today’s Cyber Crime Differ from the Hacker Exploits oYesterday? 
The Reality of Information Warfare in the CorporateEnvironment Industrial Espionage — Hackers for Hire
Public Law Enforcement’s Role in Cyber Crime InvestigationsThe Role of Private Cyber Crime Investigators and Security Consultants in Investigations
Video demo presentation on Computer forensics
Investigations Vs Forensic Analysis
How do crooks try to keep their secrets, secret?
• Formatting Forensic data Wiping Recovery of dataHow much is it worth Recovery of passwords and credit detailsEncryption …. What is and what is not protectionLaptops cameras and other security worriesMobile phone forensics
Video Demonstration (full images) – covering various scenario
CourseIntroduction
Forensics is the application of science and technology to civiland criminal legal investigations. While most forensicsprograms focus on the traditional approaches —ngerprints, DNA, photography — the CSI WorldHeadquarters inauguration program targets cyberforensics— forensic analysis and procedures of the new millennium. The CSI-CyberForensics program focuses on the basics of computer forensics with an emphasis on the legal aspectsand techniques for such investigation. There is a whole new science to collecting evidence andensuring it will be admissible in a court of law. In thecomputer age, systemic risk investigators must learn to catchsomeone who has committed a crime when the evidence ismost likely to be found on that suspect's computer, PDA, cellphone, MP3 player, or other digital device. It's often highlysensitive data that, if mishandled, can be corrupted and lostforever.Because computer-aided systemic risk and identity theft areon the rise with no end in sight, computer forensics trainingis essential for the modern systemic risk investigator. InAmerica, the FBI sponsors the Regional Computer ForensicsLaboratories (RCFLs) staed by local, state and federal lawenforcement personnel to meet this very pressing need. Inthis rst CSI World Headquarters Malaysian Chapterinauguration meeting, CSI instructors will share theirknowledge with the registered participants on this veryinteresting and exciting tool in cybercrime investigation. Youcan expect more computer forensics labs to start appearingaround the world, as digital experts continue to emerge andbranch out. The career prospect in this specialized eld is justbeginning to be realized. This is an opportunity to be aCertied System Investigator and a chance to be ahead of themarket place in the world of digital forensics and cybercrimeinvestigation.
Know your threat
Inside tricks being used USB or not USB that is the questionOnline passwords
Video Demonstration (full images) – covering various scenarioComputer imaging software
FTK Imager Pros and cons between the two different typesHave a Forensic plan and image now not later 
Video Demonstration (full images) – covering various scenario
Where to from hereIntroduction to the Imaging courseOther courses available
The 4 Steps in Fraud Risk Assessment to prevent ComputerFraud
The need to consider outsourcing an investigation that involvescomputersWhere to seek help in the event of a suspected computer fraud.How to proceed with an investigation that involves the use of computers
Q and A session
 
   C  o  u  r  s  e   O  u   t   l   i  n  e
2 Tea Breaks and 1 Lunch Break will be provided
IMPORTANT NOTICE : TRAINING INCLUDES THE USE OF SOME VENDOR VIDEO CLIPS.This program is designed for the basic computer user and information systems manager in mind, explaining the concepts needed to read through thehype in the marketplace and understand risks and how to deal with them. This is not intended to be a ``frequently asked questions'' reference, nor is it a``hands-on'' workshop describing how to accomplish specific functionality. That means, this is NOT a consultancy session. It is hoped that the audiencewill have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace.”By signing up for this Digital Forensics and Cyber Crime Masterclass 1, you understand and agree that as a matter of necessity, the use of Vendorvideo demonstration in training is inevitable and unavoidable. You understand that this is not an attempt to sell or market Digital forensics hardware orsoftware by way of indirect product placement.”
 
Upon Registration -
receive the following absolutely FREE
 
- Associate Membership with CSI World Headquarters
 
- for all non-members who register for this masterclass
- Certified Membership!
this applies to current ACSIs only
- 5% Credit Voucher (only for CSIs and for events in Malaysia only)
- terms & conditions apply
- A complimentary pass to attend ‘Launch of CSI Malaysia Chapter, 18 Nov 09
more information will be provided upon registration
 
Tel : (65) 6222 9860 | Fax: (65) 6222 9865 | www.icfe-cg.com | enquiry@icfe-cg.com
AboutOurTrainer
Tommy Seah
Call today for a COMPLIMENTARY CONSULTATION! No Obligations.
• The only Regent Emeritus of the Association of Certified Fraud Examiners (ACFE) within
the Asia Pacific
• Chairperson Emeritus of CSI World Headquarters• World Class Financial Management Expert• Double Firsts in Financial Management and Accountancy (U.K.)• Chartered Banker, International Accountant, FCPA (USA), CSOXP• Member of Advisory Board to SOX Institute (N.Y.)• Member of Singapore Institute of Directors
 To say that Tommy is a man of many talents would be an understatement. He is one of those people that you would like tomeet in person. Unassuming, straight talking, funny, sincere, ruthlessly honest, experienced and helpful would be some of theusual comments about him. Tommy is the only Singaporean that has ever achieved a Double First in the English AccountancyExamination for Financial Management and in the Accountancy Finals.He is also a US qualied Forensic Accountant, a Chartered Banker, a System Auditor and a Certied Fraud Examiner. He hastaught Financial Management in both the ACCA and the post-graduate ACCA Certication and MBA business nance formany years in Singapore and abroad. Notwithstanding the fact that he is exceedingly well known in the Financial andEconomic Crime circle as a Number One Fraud Buster, his rst love is Financial Management.In 2005, he was appointed as Compliance Adviser to a US$25 billion Asset Management Company. In the following year hewas invited to be the FEC Adviser to a European nancial institution.He conducts Asset and Liability Management Executive Coaching sessions to some of the most established FinancialInstitutions in the region. He is also a member of The Board of Regents of the Association of Certied Fraud Examiners Boardbased in Texas, USA. Tommy created history when he was elected to the ACFE World Headquarters Board of Regents, rst as a member andsubsequently as its Vice Chairman. He is the only Asian that sits on the American Board of Regents. Today, he spent a substantial amount of his time in advising nancial institutions in sound Financial Management throughpublic speaking and private coaching. His most notable accomplishment thus far is in giving the bank practitioners a rm gripon Managing for Value methodology.He founded CSI World Headquarters in Singapore one whole year before the global nancial crisis came to pass and systemicrisk became a household word. He intends to built CSI World Headquarters into a global classication and certication bodypreventing systemic risk and using Digital Forensics as a tool in fraud investigation. For his contribution in the area of highnance, he was honored as a course Professor of Economics by the CIOD, Shanghai, Greater China.He also wrote the book on Sound Financial Management. His hobby includes sharing his knowledge on Computer DigitalForensics and ghting terrorists in money laundering.
Important Notice 
“ Due to the interactive nature of the learning session, the sequence and contents of the program maybe vary according to the needs of the participants. The speaker reserves the right and the privilege to conduct the program in the manner which he thinks to be in the best interest of the majority of the participants. Please ensure that you understand this completely so as to prevent any form of unrealistic expectation and or disappointment in a public enrolment program that was not tailored to your specific need. Please inform the organizer in advance if you are not agreeable or do not completely understand the above term and we will review your enrolment accordingly. ” 
Complete the registration form at the back of this brochure and send it back to us via fax / email

Activity (8)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Mhark Rojas liked this
chaitanya_bhole liked this
baburamaryal liked this
rgscontech liked this
berijoan liked this
harshadspatil liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->