Title: Linux as an Investigative Tool, part 2
Year: Jan 2010 – Version 3.0
Duration: 1 Week
This is the second part of a two-part course encompassing a Basic Linux component and a Linux Forensic Application component.
The aim of this course is to build on the skills acquired in Linux Part One. This second part will concentrate on the forensic application of Linux and is designed to equip forensic examiners with the in-depth knowledge necessary to recover and produce evidence from seized computers using the Linux operating system. This will also enable them to better assemble evidence for court that is clear and supportive of evidential needs. Training will encompass latest best practice, technologies and techniques available to Law Enforcement specialists.
Students are expected to have successfully participated in basic training for High Tech Crime Investigators. They will have normally completed the E.C.T.E.G Introductory IT Forensics and Network Investigations Course.
It is also highly recommended that students have also completed the E.C.T.E.G Linux as an Investigative Tool – Part One. Prior to commencement of the course they should ensure that they are familiar with the following:
Small list of agenda / topics / main points
All courses that have been developed for E.C.T.E.G are freely available for law enforcement organisations. They include all necessary slides as well as manuals for trainers and students. The courses include the following properties: