CDFS provides internationally recognised and industry-embedded training aimed at forensic investigators, digital security practitioners, and those with forensic experience wanting to develop their skills further. We bridge the gap between what you know and what you need to know to be effective in your digital investigations.
Showing 13–24 of 52 results
BEC100 Belkasoft Prerequisite Course
This course is designed to introduce new examiners to the realm of digital forensics and provide the baseline of foundational knowledge needed to perform analysis of artifacts acquired from digital evidence. The BEC workflow is designed around the following fundamental concepts of digital forensics: Identification of digital evidence Logical disk structures Maintaining the integrity of […]
- Price: $950 USD
- Location: Online
BEC101 Belkasoft Certification Course
The Belkasoft Evidence Center Certified Examiner course is designed to provide local/federal law enforcement, military investigative personnel, and private sector security professionals training on the knowledge and The Belkasoft Evidence Center Certified Examiner course is designed to provide local/federal law enforcement, military investigative personnel, and private sector security professionals training on the knowledge and skills […]
BEC301 Mobile Device Investigations Course
As a proven industry leader, Belkasoft has remained at the forefront of innovation when forensically acquiring mobile device data, while safely bypassing security constraints using the latest techniques. This course will provide students with the tools needed to perform forensic analysis of Apple iOS and Google Android mobile devices from within the BEC platform. The […]
202C SMI Social Media Intelligence & Investigation (1-2 November 2021)
Social Media Intelligence (SMI or SOCMINT) is processed information, sourced from online social platforms and applications that facilitate and enable the collecting, monitoring, and analysis of up-to-date online sentiment and social commentary. The rich and varied information available from social platforms may be live or historical, opinion or fact, text or multi-media, proprietary or crowd-sourced; […]
- Date: 01-02 Nov 2021
- Price: 990
- Location: Remote Delivery
Tips & Tricks // AXIOM Reporting Now & Then – Exploring AXIOM’s updated reporting features in AXIOM 4.0
Speakers: Jessica Hyde Date and time: September 10, 11:30AM SGT, 1:30PM AEST In this Tips and Tricks we will explore AXIOM’s new reporting features and show improvements. Additionally, we will share tips and tricks for users of previous versions of AXIOM to produce desired output comparing how things were done in older versions. We will […]
- Date: TBA
- Price: $0
- Location: Online Webinar
UFED 7.36 capabilities & Handling Huawei Backup and Google Takeout
Speakers: Frederick Huang, Corrine Hoo, Jeffrey Png Date and time: September 10, 15:30 Canberra (AU) Topics to be discussed: 1. New capabilities by UFED 7.36 a. Qualcomm live now support Samsung and Huawei devices b. More chipset support for Huawei Decrypting Kirin Bootloader c. KeyChain extracted as part of checkm8 for iOS 13.5 d. […]
So Many Logs, So Little Time: Efficient Windows Event Log Analysis
Speakers: Dr. Vico Marziale Date and time: September 16, 13:00 Canberra (AU) Windows Event Logs record evidence of many significant types of activity, including when a machine was booted or shut down, when users logged in and out and from where, device insertions, network connections and so much more. But knowing how to efficiently […]
Digital Intelligence Produces Crucial Clues To Trace Cryptocurrencies
Speakers: Pamela A. Clegg, Yuval Ben-Moshe The July 15th Twitter-hack allowed hackers to post fake tweets on 130 compromised accounts owned by a range of well-known individuals and corporations, ranging from Barack Obama to Elon Musk to Kanye. The messages promoted a “giveaway,” which was really a giveaway scam. This false marketing allowed the […]
- Date: TBA
- Location: Online webinar
101E IRT Using the Internet as an Investigative Research Tool
While general internet research appears simple, the Web can be very difficult to navigate when searching for timely, accurate, and actionable intelligence. The complexities of the internet can produce missing information, and a user’s safety, integrity, and privacy can be compromised if they are unaware of the inherent risks that come with online research and […]
102E IIA Introduction to Intelligence Analysis
Introduction to Intelligence Analysis is a two-level e-learning course, designed to equip aspiring and inexperienced analysts, as well as other interested investigative and security professionals, with the knowledge and skills required to undertake intelligence analysis tasks, and to better understand intelligence analysis products when when encountered or assigned.
201E SMI Social Media Intelligence & Investigation
Social Media Intelligence (SMI or SOCMINT) is processed information, sourced from online social platforms and applications that facilitate and enable the collecting, monitoring, and analysis of up-to-date online sentiment and social commentary. The rich and varied information available from social platforms may be live or historical, opinion or fact, text or multi-media, proprietary or crowd-sourced; depending on the data provided by each source, and an investigator’s ability to cross-reference the data across platforms and tools, a comprehensive profile of an individual, location, or event can often be built quickly and accurately.
203C CTI Critical Thinking for Investigators
In an age of overwhelming misinformation, disinformation and propaganda, critical thinking skills are more essential than ever to determine fact-from-fiction and make the best possible decisions.
While we are called upon to use our critical and logical thinking skills on a daily basis, most of us are simply not good at it; we are all subject to a range of biases and “thinking mistakes” that we may not be aware of.
What we think of as “common sense” is just not enough.
- Price: $350
- Location: Remote Delivery