AccessData launches Cyber Crime Investigation Boot Camps in India

AccessData Corporation and Foundation Futuristic Technologies P Ltd. (ForensicsGuru) today announced a joint partnership to launch a CyberCrime Investigation BootCamp Training Course in India. This instructor-lead course is intended for Forensic Investigators, Law Enforcement Personnel, and Security & Network Administrators that are responsible for creating cases that capture, analyze, and classify digital evidence left on computer hard drives.The 3-day training is designed to provide students with the knowledge and skills necessary to install, configure, and effectively use the combined abilities of AccessData’s Forensic Toolkit (FTK) and Password Recovery Toolkit (PRTK) to locate and examine e-mail messages, deleted files, free space and file slack. Additionally, students will learn how to search for and export graphic files, as well as export and gain access to encrypted files from multiple industry standard applications. Documenting digital media information and working with multiple forensic image formats are also explored. The CyberCrime Investigation BootCamp Training Courses will be taught by accredited AccessData Certified Examiners (ACE). These trainers have extensive experience in computer forensic case examination from the law enforcement sector.

The course will be taught each month at select locations throughout India during 2007. ForensicsGuru is the only authorized distributor of AccessData software and Training in the country of India.

About AccessData

AccessData Corporation, a pioneer in the forensic computing industry, provides the tools and training to empower examiners at the local, state, and federal levels as well as corporations to perform thorough investigations with speed and efficiency. AccessData has led the forensic computing industry with its password cracking and decryption technology for over 18 years. In addition, during the late 1990’s AccessData expanded its offering to include the Forensic Toolkit®, FTK®, which enables investigators to analyze electronic files for evidence including any cracked or decrypted files. AccessData is a recognized leader in the field of digital forensics training and certification with its AccessData Certified Examinersâ„¢ program (ACEâ„¢), ensuring forensic examiners worldwide follow established standards and guidelines. AccessData is headquartered in Lindon, Utah.

Get The Latest DFIR News!

Top DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

About Foundation Futuristic Technologies P Ltd. (ForensicsGuru)

ForensicsGuru is the industry leading provider of Cyber Crime Investigation and Computer Forensics solutions in India and South Asia. ForensicsGuru provides a comprehensive cyber crime investigation product range, Digital Investigation Training and Computer Forensic Consulting services to Law Enforcement Agencies, Government Sector as well as the Information Security and Incident Response Teams of the Private Sector. Working closely with Law Enforcement Agencies in India, ForensicsGuru has been evangelizing the use of Computer Forensics in Digital Investigations and is focused in helping Police forces in India obtain and benefit from best of breed, world standard cutting edge technological solutions in this arena. Foundation Futuristic Technologies is headquartered in New Delhi, India.

Leave a Comment

Latest Videos

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Forensic Focus 22nd June 2022 5:00 am

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run. 

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems. 

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run.

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems.

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i0zd7HtluzY

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Forensic Focus 21st June 2022 5:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...