Write an effective investigation report
Who did what, where, when, and how? An investigation must provide answers to each of these questions concerning the issues at hand. Everyone wants to
<%= domainName %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_title %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_description %>
With Practical Skills You Suceed. Please book one of our year training events.
Download our Annual Training Calendar from here
Today’s global and volatile economy challenges organizations with increasing level of complexity and uncertainty, increasing pace of technological and business changes, escalating compliance requirements, reliance on IT, the complexity of the supply chain, corporate social capital investment, the fragility of reputation and so on have highlighted the vulnerability of organizations to these risk issues.
CFFP is the world’s most comprehensive fraud investigation using forensic science. A CFFP can handle any kind of investigation covering digital and financial forensics as well as criminal investigations involving fraud.
This CCSM (Certified Cyber Security Manager) certification training will give you the requisite skillsets to design, deploy and manage security architecture for your organization.
Data and big data analytics are the lifeblood of any successful business. Getting the technology right can be challenging but building the right team with the right skills to undertake big data initiatives can be even harder.
This is a two-year programme that equips graduates with the knowledge and technical (practical) skills in Risk Management. The duration is broken down into four semesters.
This is a two-year programme that equips students with the knowledge and technical (practical) skills in computer forensics and information security (cybersecurity). The duration is broken down into four semesters.
Learn about integrated endpoint protection, network security risk management and enhanced user behaviour analysis for predictive security protection.
Data at rest has proved to a more lucrative venture for cybercriminals owing to the fact that more volumes of valuable information are easily accessible at rest than when in transit.
You cannot protect what you do not know, and understanding forensic capabilities and artefacts is a fundamental cog of information security.
This is an introductory course that will explain the concepts of computer forensics as well as demonstrations of proper collections of digital evidence.
This course aims to enable investigators to investigate the Apple devices they encounter.
Take your skills to the next level: it’s time for the good guys to get smarter and for the bad guys to know that their smartphone activity can and will be used against them!
In a world where smartphones store gigabytes of personally identifiable information, human negligence remains the single biggest threat to the security of your personal and corporate information.
This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations.
This five-day course covers a wide range of baseline topics, including terminology, the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles.
12
Who did what, where, when, and how? An investigation must provide answers to each of these questions concerning the issues at hand. Everyone wants to
According to Gartner’s report on ‘Innovation Insight for Attack Surface Management (ASM)’, which covers the growing need faced by security teams to manage an expanding
The increasing number and sophisticated nature of cyber-crimes prevailing in industries worldwide. As governing bodies are stepping up to help organizations mitigate the prevailing attack
A dedicated team of staff are waiting to answer your inquiries.
Please submit an inquiry.
© All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd
There was a problem reporting this post.
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.