All RCFL Training

All RCFL Training at all RCFL locations


Dec 20, 2017
08:30 AM - 03:00 PM

Location: San Diego RCFL

Cell Phone Investigations

The Cell Phone Investigations Course is designed for the first responder and investigators. This 1-day course offers hands-on operation of the UFED Touch, exposes students to logical extraction and data analysis. Students can expect to perform a number of hands-on logical extractions on various mobile devices with a variety of operating systems. Participants also create reports on findings and are exposed to the free UFED Reader and how to use that to multiply investigative efforts. Learn and share knowledge about iPhone, Android, and other smart phones.

Register


Nov 15, 2017
08:30 AM - 03:00 PM

Location: San Diego RCFL

Cell Phone Investigations

The Cell Phone Investigations Course is designed for the first responder and investigators. This 1-day course offers hands-on operation of the UFED Touch, exposes students to logical extraction and data analysis. Students can expect to perform a number of hands-on logical extractions on various mobile devices with a variety of operating systems. Participants also create reports on findings and are exposed to the free UFED Reader and how to use that to multiply investigative efforts. Learn and share knowledge about iPhone, Android, and other smart phones.

Register


Oct 18, 2017
08:30 AM - 03:00 PM

Location: San Diego RCFL

Cell Phone Investigations

The Cell Phone Investigations Course is designed for the first responder and investigators. This 1-day course offers hands-on operation of the UFED Touch, exposes students to logical extraction and data analysis. Students can expect to perform a number of hands-on logical extractions on various mobile devices with a variety of operating systems. Participants also create reports on findings and are exposed to the free UFED Reader and how to use that to multiply investigative efforts. Learn and share knowledge about iPhone, Android, and other smart phones.

Register


Sep 20, 2017
08:30 AM - 03:00 PM

Location: San Diego RCFL

Cell Phone Investigations

The Cell Phone Investigations Course is designed for the first responder and investigators. This 1-day course offers hands-on operation of the UFED Touch, exposes students to logical extraction and data analysis. Students can expect to perform a number of hands-on logical extractions on various mobile devices with a variety of operating systems. Participants also create reports on findings and are exposed to the free UFED Reader and how to use that to multiply investigative efforts. Learn and share knowledge about iPhone, Android, and other smart phones.

Register


Sep 12, 2017
08:00 AM - 04:00 PM

Location: GHRCFL

Windows Artifacts

WinArt covers the identification and extraction of artifacts associated with the current versions of Microsoft Windows operating systems (Vista through Windows 10) and the NT file system. Topics include the change journal, BitLocker, and a detailed examination of the various artifacts found in each of the registry hive files. Students examine event logs, volume shadow copies, link files, and thumbnails. WinArt uses a mixture of lecture, discussion, demonstration, and hands-on exercises. Detailed description seen here: http://www.nw3c.org/training/cybercrime/22

Register


Aug 16, 2017
08:30 AM - 03:00 PM

Location: San Diego RCFL

Cell Phone Investigations

The Cell Phone Investigations Course is designed for the first responder and investigators. This 1-day course offers hands-on operation of the UFED Touch, exposes students to logical extraction and data analysis. Students can expect to perform a number of hands-on logical extractions on various mobile devices with a variety of operating systems. Participants also create reports on findings and are exposed to the free UFED Reader and how to use that to multiply investigative efforts. Learn and share knowledge about iPhone, Android, and other smart phones.

Register


Aug 01, 2017
08:00 AM - 04:00 PM

Location: GHRCFL

Intermediate Data Recovery and Analysis

IDRA builds on the concepts introduced in BDRA. It covers the architecture and functionality of the Windows NT File System (NTFS), the FAT File System, and related directory entry information for locating files on electronic devices. Topical areas include file headers and file hashing, recovery of deleted files and long file names, and techniques for discovering potential evidence that might otherwise be overlooked. IDRA incorporates an investigative scenario, providing hands-on experience with hard drive examination. Detailed description seen here: http://www.nw3c.org/training/cybercrime/16

Register


Jul 19, 2017
08:30 AM - 03:00 PM

Location: San Diego RCFL

Cell Phone Investigations

The Cell Phone Investigations Course is designed for the first responder and investigators. This 1-day course offers hands-on operation of the UFED Touch, exposes students to logical extraction and data analysis. Students can expect to perform a number of hands-on logical extractions on various mobile devices with a variety of operating systems. Participants also create reports on findings and are exposed to the free UFED Reader and how to use that to multiply investigative efforts. Learn and share knowledge about iPhone, Android, and other smart phones.

Register


Jul 12, 2017
08:00 AM - 05:00 PM

Location: San Diego RCFL

Case Agent Investigative Review (CAIR)

Forensic Tool Kit (FTK) is one of several tools that the San Diego RCFL uses while conducting digital forensics examinations. This one day course teaches investigators how to use FTK so they can conduct a comprehensive review of the digital media that has been submitted to, or processed by the San Diego RCFL. This course also teaches investigators how to locate and examine e-mail messages, deleted files, documents, graphic files, and how to search for key words and phrases.

Register


Jun 28, 2017
08:00 AM - 04:00 PM

Location: GHRCFL

Basic Data Recovery and Acquisition

BDRA covers the fundamentals of computer operations, hardware function, configuration, and best practices for the protection, preservation, and imaging of digital evidence. Presentations and hands-on exercises cover topics such as partitioning, data storage, hardware and software write blockers, the boot-up and shut down processes, live imaging, encryption detection, and duplicate imaging. BDRA incorporates computer forensic applications that experienced practitioners are currently using in the field. Detailed description seen here: http://www.nw3c.org/training/cybercrime/4

Register


Document Actions