Digital Forensics and Weapons Systems Primer

  • Overview
  • Course Content
Overview

Digital Forensics and Weapons Systems Primer

Course Description

In Digital Forensics and Weapons Systems Primer you will explore the forensic investigation of the combination of traditional workstations, embedded systems, networks, and system busses that constitute the modern-day-weapons system. The course reviews the similarities and differences between commodity PCs and embedded systems. You will gain knowledge of a wide variety of forensic evidence data sources from all classes of systems, as well methods of data acquisition, evidence extraction, and analysis using a wide variety of tools (both commercial and open-source). Abbreviated hands-on labs will be utilized to demonstrate a these tools.

Course Content

FOUNDATION AND DISK-BASED FORENSICS

  • DF foundations
  • Forensic Acquisition and analysis of disk-based systems

EMBEDDED SYSTEMS AND NETWORKING

  • Forensic acquisition and analysis of embedded systems
  • Network and internal bus traffic forensic analysis

ADVANCED FORENSICS

  • Tools
  • Capstone lab

Session Details

  • Special Discounts: Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

This course is designed for military, law enforcement, and IT professionals responsible for incident response, failure analysis, and digital investigations.

Defense technology professional attending professional short course

What You Will Learn

  • Digital forensics foundations and disk-based forensics
  • Forensic acquisition and analysis of disk-based systems
  • Forensic acquisition and analysis of embedded systems
  • Network and internal bus traffic forensic analysis
  • Survey of advanced forensic tools and hands-on lab activities
Cybersecurity professional working on computer

How You Will Benefit

  • Conduct forensic data acquisition.
  • Analyze various storage mediums, such as volatile and non-volatile memory, and data sources, such as serial bus and network captures.
  • Investigate simulated weapons system compromises.
  • Demonstrate the ability to conduct an end-to-end digital forensics investigation.
  • Taught by Experts in the Field icon
    Taught by Experts in the Field
  • Grow Your Professional Network icon
    Grow Your Professional Network

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani
President

TRAIN AT YOUR LOCATION

We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More

Want to learn more about this course?