top of page

About

Lead Computer Forensics Examiner training enables you to acquire the necessary expertise to perform Computer Forensics processes in order to obtain complete and reliable digital evidence. During this training course, you will also gain a thorough understanding of Computer Forensics fundamentals, based on the best practices used to perform forensics evidence recovery and analytical techniques. This training course is focused on core skills required to collect and analyze data from Windows, Mac OS X, and Linux operating systems, and also from mobile devices.

After mastering all the necessary concepts of Computer Forensics processes, you can sit for the exam and apply for a “PECB Certified Lead Computer Forensics Examiner” credential. By holding a PECB Lead Computer Forensics Examiner Certificate, you will be able to prove that you have the expertise to lead advanced forensic investigations and conduct forensics analysis, reporting, and evidence acquisition.


Where is this Course Available?

This course is available In-Person in Doha, Qatar, Dubai, Abu Dhabi in UAE & Riyadh, Saudi Arabia and Amman, Jordan as well as being available Online Worldwide.


Who is this Course for?


  • Computer Forensics specialists


  • Computer Forensics consultants


  • Cybersecurity professionals


  • Cyber intelligence analysts


  • Electronic data analysts


  • Specialists in computer evidence recovery


  • Professionals working or interested in law enforcement


  • Professionals seeking to advance their knowledge in Computer Forensics analysis


  • Information Security team members


  • Information technology expert advisors


  • Individuals responsible for examining media to extract and disclose data


  • IT Specialists


Learning Objectives


  • Understand the roles and responsibilities of the Lead Computer Forensics examiner during digital forensic investigation


  • Understand the purpose of electronic media examination and its correlation with common standards and methodologies


  • Comprehend the correct sequence of steps of a computer incident investigation and digital forensic operation


  • Understand the common commercial and open source tools that may be used during incident investigation and digital forensic operations


  • Acquire the necessary competencies to plan and execute a computer forensics operation and also implement and maintain a safety network to protect evidence


Educational Approach

  • This training is based on both theory and best practices used in Computer Forensics


  • Lecture sessions are illustrated with examples based on case studies


  • Practical exercises are based on a case study which includes role playing and discussions


  • Practice tests are similar to the Certification Exam


Prerequisites

Knowledge on Computer Forensics.

Untitled design (15).png

Modules

AIGP.png

Module 1 : Identifying Security Compliance Measures

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 2 : Recognizing and Addressing Social Engineering Attack

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 3 : Securing Devices

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

image 38.png

Module 4 : Using the Internet Securely

  • Identify Organizational Compliance Requirements and Resources 

  • Identify Legal Compliance Requirements and Resources 

Soft Gradient Background

Receive an Official ISACA Certificate

LinkedIn_logo_initials.png

Receive a LinkedIn Badge

Gain a Certificate After Completion

Highlight your achievement by adding this credential to your LinkedIn profile, CV, or résumé. Your digital certificate will be awarded upon successful completion of the programme, giving you a recognised credential to share with employers, colleagues, and clients.

Course Certificate.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png

Exam Details

The “PECB Certified Lead Computer Forensics Examiner” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). 


The exam covers the following competency domains:


  • Domain 1: Fundamental principles and concepts of Computer Forensics

  • Domain 2: Best practices on Computer Forensics

  • Domain 3: Digital forensics laboratory requirements

  • Domain 4: Operating system and file system structures

  • Domain 5: Mobile devices

  • Domain 6: Computer crime investigation and forensics examination

  • Domain 7: Maintaining chain of evidence

Course Study Options

Self Study

Online Study at Your Own Pace

In-Person Training

12 Locations in Middle East. View

Live Online Training

Course Duration : Flexible

Soft Gradient Background
sandra 1.png

Discuss This Course With Us

Hello, I’m Sandra, Assistant Manager at MENA Executive Training.

I'm here to talk you through the details of this course, answer any questions you may have and help get you booked in!

You May Also Be Interested In

Rock Logo
IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Rock Logo
Basic elements of AI and machine learning
ISACA-Accreditd-Partner_edited.png
Rock Logo
AIGP Artificial Intelligence Governance Professional IAPP
ISACA-Accreditd-Partner_edited.png
Soft Gradient Background
Mena Executive Training
a.jpg

Lead Computer Forensics Examiner

Taught : Online & In-Person & Self-Study

Official Training

Language : undefined

Duration : Flexible

Rock Logo
bottom of page