360€
306€
-15% (hasta el 30/04/2026)
* Becas y descuentos no aplicables a formación programada
- Presentación
- Temario
- Metodología
- Titulación
Descripción
¿A quién va dirigido?
The Course in Computer Forensic Expertise is designed for professionals and graduates in the IT and cybersecurity sectors who are eager to enhance or update their knowledge in computer forensics. This course offers supplementary training, ideal for those looking to deepen their understanding of digital investigation without being a prerequisite for professional practice.
Objetivos
- To understand the fundamental principles of computer forensics and its importance in cybersecurity. - To identify and analyse digital evidence using industry-standard forensic tools and methodologies. - To develop skills in preserving the integrity of digital evidence for legal proceedings. - To learn how to conduct thorough investigations of cyber incidents and security breaches. - To enhance your ability to create detailed forensic reports for stakeholders and legal authorities. - To explore the ethical and legal considerations in the practice of computer forensics. - To gain proficiency in recovering data from damaged or compromised digital devices.
Salidas Profesionales
- Digital forensic analyst in law enforcement agencies - Cybersecurity consultant for private firms - Expert witness in legal cases involving cybercrime - IT security specialist for government organisations - Corporate investigator for data breaches - Cyber incident responder for financial institutions - E-discovery specialist for legal firms
Temario del Course in Computer Forensic Expertise
UNIT 1. COMPUTING, CONNECTIVITY, AND THE INTERNET
- Computing
- - Basic concepts
- Components of a computer system
- Basic structure of a computer system
- Central processing unit in a computer system
- - Structure
- Common peripherals: Connectivity
- Operating system
- Internet
- Internet connectivity
- - Types of networks
- - Wireless network
UNIT 2. FUNDAMENTALS OF COMPUTER FORENSICS AND DIGITAL FORENSICS
- Concept of computer forensics
- Objectives of computer forensics
- Uses of computer forensics
- The role of the computer expert
- Computer forensic laboratory
- Digital evidence
- - Volatile and non-volatile evidence
- - Evidence labeling
- Chain of custody
UNIT 3. CYBERCRIME
- Computer crime
- - Main characteristics of computer crime
- Types of computer crime
- Cybercrime
UNIT 4. ETHICAL HACKING
- What is ethical hacking?
- - Hacker ethics
- - Values of hacker ethics
- - Phases of ethical hacking
- - Types of ethical hacking
- Legal aspects of ethical hacking
- - Ethical hacking process
- - Code of ethics and certification
- Ethical hacker profiles
- - Black hat hacker
- - White hat hacker
- - Gray hat hackers
- - Hacktivism
- Vulnerability testing
- - Steps to set up a pentesting lab
- Sniffing
- Types of security testing in web environments
- - Identifying proxy mechanisms used
- - Enumeration of valid hosts
- - Web Server Profiles
UNIT 5. FORENSIC ANALYSIS
- Forensic analysis
- Stages of forensic analysis
- - Preliminary study
- - Data acquisition
- - Analysis and investigation
- - Presentation and preparation of the expert report
- Types of forensic analysis
- Requirements for forensic analysis
- Main issues
UNIT 6. DATA SUPPORT
- Data acquisition: importance in digital forensic analysis
- OSI Model
- File recovery
- - Dynamics of file deletion
- - Requirements for file and data recovery
- - Key tools for data recovery
- - Recovery process
- File analysis
- - Signature identification
- - Documents
- - Graphics and multimedia files
- - Executable files
UNIT 7. INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS)
- The information society
- What is information security?
- Importance of information security
- Fundamental principles of information security: confidentiality, integrity, and availability
- - Principle of confidentiality
- - Principle of integrity
- - Principle of availability
- Description of security risks
- Selection of controls
- Success factors in information security
- Benefits of an information security system
Metodología
EDUCA LXP se basa en 6 pilares
Item
Titulación del Course in Computer Forensic Expertise
Degree Issued and Endorsed by INESEM Business School. “Non-Official Education and Not Leading to the Award of an Official Degree or Certificate of Professionalism”.
INESEM Business School se ocupa también de la gestión de la Apostilla de la Haya, previa demanda del estudiante. Este sello garantiza la autenticidad de la firma del título en los 113 países suscritos al Convenio de la Haya sin necesidad de otra autenticación. El coste de esta gestión es de 65 euros. Si deseas más información contacta con nosotros en el 958 050 205 y resolveremos todas tus dudas.
Explora nuestras Áreas Formativas
Construye tu carrera profesional
Descubre nuestro amplio Catálogo Formativo, incluye programas de Cursos Superior, Expertos, Master Profesionales y Master Universitarios en las diferentes Áreas Formativas para impulsar tu carrera profesional.
Course in Computer Forensic Expertise
360€
306€
360€
306€