Start Date:
End Date:
Event dates
Start Date:
End Date:
Training topics
  • Cybersecurity
Training type
Online instructor led
  • English
Event organizer
Event mail contact
  • Olajumoke Oloyede
  • Emmanuel NIYIKORA


Cyber is a buzz word that could be referred to as digital or computer in related to forensic. It is one of the most highly paid professional field in today's technology, is the practice of collecting, analyzing and reporting on computer-related crime with a goal of obtaining evidence that is legally admissible. From educational bodies to high level tech industry, spectrum of available computer forensic tools and skills were highly demanded. The core forensic procedures and methodology has become one of the most widely used approaches to ensure court admissibility of evidence, as well as the legal and ethical implications. The origin of cyber forensic is to prove and legally prosecute cybercrime, it has been used in a number of high-profile cases and is becoming widely accepted as reliable all over the world, focusing on all levels of the organization, personal and public digital-data with an integrated solution. Combining the IT risk management with cyber forensic is to embraces principles, models and methods for identifying, analyzing, describing, communicating and managing risk information technology and cyber forensic. OBJECTIVES At the end of this workshop, participants will be able to: ⢠Understand the court admissibility investigative procedures ⢠Learn how to use attributes of Windows and Unix/Linux file systems and file recovery processes. ⢠Understand and identify appropriate forensic tools to acquire, preserve and analyze system image. ⢠Apply appropriate forensic tools to acquire, preserve and analyze system image. ⢠Review and critique a forensic report. ⢠Understand risk analysis and risk management. ⢠Lean how to develop risk management strategies. ⢠Learn how to apply the risk management best practice.

Related documentation and links
Share in