Cursos
Valor: 1700 €
Horário:
2ª, 4ª e 5ª das 18:00 H ás 22:00 H
Formato: Online
Nº Horas: 30 H
Duração: 4 semanas
- Alternative Title(s)
- Digital Forensics Analyst
- Cybersecurity & Forensic Specialist
- Computer Forensics Consultant
- Summary Statement
Ensure the cybercriminal investigation reveals all digital evidence to prove the malicious activity.
- Mission
Connects artefacts to natural persons, captures, recovers, identifies and preserves data, including manifestations, inputs, outputs and processes of digital systems under investigation. Provides analysis, reconstruction and interpretation of the digital evidence based on a qualitative opinion. Presents an unbiased qualitative view without interpreting the resultant findings.
- Deliverable(s)
- Digital Forensics Analysis Results
- Electronic Evidence
- Main Task(s)
- Develop digital forensics investigation policy, plans and procedures
- Identify, recover, extract, document and analyse digital evidence
- Preserve and protect digital evidence and make it available to authorised stakeholders
- Inspect environments for evidence of unauthorised and unlawful actions
- Systematically and deterministic document, report and present digital forensic analysis findings and results
- Select and customise forensics testing, analysing and reporting techniques
- Key Skill(s)
- Work ethically and independently; not influenced and biased by internal or external actors
- Collect information while preserving its integrity
- Identify, analyse and correlate cybersecurity events
- Explain and present digital evidence in a simple, straightforward and easy to understand way
- Develop and communicate, detailed and reasoned investigation reports
- Key Knowledge
- Digital forensics recommendations and best practices
- Digital forensics standards, methodologies and frameworks
- Digital forensics analysis procedures
- Testing procedures
- Criminal investigation procedures, standards, methodologies and frameworks
- Cybersecurity related laws, regulations and legislations
- Malware analysis tools
- Cyber threats
- Computer systems vulnerabilities
- Cybersecurity attack procedures
- Operating systems security
- Computer networks security
- Cybersecurity-related certifications
- e-Competences (from e-CF)
A.7. Technology Trend Monitoring (Level 3)
B.3. Testing (Level 3)
B.5. Documentation Production (Level 3)
E.3. Risk Management (Level 3)