1.  ADVANCED TECHNOLOGY VENDOR / PRODUCT BASED TRAINING:

This training is target specific digital forensics items that requires advanced trainings provided by the technology vendors. Contego Solutions offer to design and plan the required professional training to our clients

2.  MOBILE FORENSIC TRAINING COURSES

Mobile Forensic Training Courses covers basic, intermediate and advanced   techniques designed to give you an understanding of the forensic procedures and methods required to analyze mobile phone equipment using different tools. We have designed few mobile Forensic Training courses depending on foundation to advance level as mentioned below

  1. Core Competence in Mobile Phone Forensics (5 Days)
  2. TeelTech / Wild PCS Mobile Device Repair & JTAG Forensics (5 days)
  3. TeelTech / Wild PCS Advanced BGA Chip-off & Analysis Education (5 days)

3.  COMPUTER FORENSIC TRAINING COURSES

Computer forensic Courses are designed to give you a understanding of forensics and the chains to go through when preserving and analyzing a computer and other digital storage media. We have designed few Computer Forensic Training courses depending on foundation to advance level as mentioned below

  1. Forensic Manual – Basic Forensic Understanding (1 Day)
  2. Core Competence in Computer Forensics & Data Recovery (10 Days)
  3. Computer Forensics Awareness & Incident Response (2 Days)
  4. Forensic Techniques for End User Raids (3 Days)
  5. Incident Response & Seizing electronic evidence (5 Days)
  6. Digital Forensics Laboratory Practises (10 Days)

4.  OPEN SOURCE / INTERNET INVESTIGATIONS TRAINING COURSE

This course is designed to give you an understanding of the methodologies required to conduct high quality Open Source investigations using a wide range of proven tools and techniques. The course will take the delegate through the topology of the internet and networks, utilizing open source resources, onto the capture, presentation and investigation of their findings.  A wide range of techniques will be taught, including sourcing of personal information, social media, business information, learning to capture full web pages and even full web sites. The delegate will also be taught to build their own tool kit, the importance of note taking and how to evaluate their own Open Source product. There will also be training in respect of product integrity, evidence production and evidence handling

  1. Initial Open Source Investigation Course (3-5 days)

5.  DATA RECOVERY CLASSES

Contego Solutions™ will deliver 4 weeks of practical hands on demonstrations, training and direction on the use of the data recovery tools within your Laboratory.  The aim of this training is to build on individual technical skills & to enable the correct diagnosis of hard drive errors resulting in the ability to commence a suitable data recovery strategy.  By the end of the 4 week course, participants will have the confidence to make informed decisions on the correct technical approach to each case to achieve the best possible data recovery outcome.

  1. Core Competence in Data Recovery (4 Weeks)

6.  MALWARE ANALYSIS TRAINING COURSE

This course adopts a practical approach in detecting, analyzing, reverse engineering, and eradicating malware. Some of the key aspects of this course include reverse engineering malware from various sources and using various programming languages. This is accomplished by using a standard methodology that involves setting up an inexpensive laboratory, isolating it from production environments, and utilizing a selected set of tools in order to dissect the malware, discover its characteristics, and neutralize its effects.

  1. Malware Analysis Course (4 Days)

7.  INCIDENT RESPONSE TRAINING COURSE

Incident Response Training will take you to the next level of managing an incident response team. Given the frequency and complexity of today’s attacks, incident response has become a critical function for organizations. Detecting and efficiently responding to incidents, especially those where critical resources are exposed to elevated risks, has become paramount, and to be effective, incident response efforts must have strong management processes to facilitate and guide them. Managing an incident response team requires special skills and knowledge. A background in information security management or security engineering is not sufficient for managing incidents. Furthermore, incident responders with strong technical skills do not necessarily become effective incident response managers. Special training is necessary.This course will explain how to develop the proper mind set and philosophy needed to create an incident response team in the field and to conduct a seizing electronic evidence duty. The module will explain the major concepts that need to be a part of every digital forensics examination. The module will detail the proper make-up of an incident response team as well as what such a team should be able to produce.

  1. Incident Response & Seizing Electronic Evidence Course (5 days)

For more information about courses and schedules, please feel free to contact us.