OpenText
OpenText can help you tackle the most complex digital transformation programs with confidence. With the world’s most complete and integrated Information Management platform, we empower our customers to organize, integrate and protect data and content as it flows through business processes inside and outside their organization.
DF120 – Foundations in Digital Forensics with EnCase
This hands-on course involves practical exercises and real-life simulations in the use of OpenText™ EnCase™ software (EnCase™). The class provides participants with an understanding of how EnCase™ may be used to examine data related to an incident response, an employee misconduct investigation, and/or a law enforcement criminal and/or civil investigation. Participants create cases using EnCase™, configure the application to maximize its utilization, and learn evidence acquisition concepts and how to validate the data collected. Instruction progresses to the analysis of the data whether related to criminal investigations, cybersecurity incidents, or other matters. The course will cover techniques, such as keyword or indexed searching along with hash analysis. Participants will learn how to bookmark, export, and create reports relating to examination findings. The course concludes with instruction on archiving, validating the data, and restoring the case.
DF125 – Mobile Device Examinations With EnCase
This hands-on course provides practical demonstrations and real-life simulations to help understand the methodology of using EnCase™ Forensic and EnCase™ Mobile Investigator in mobile device examinations involving criminal, corporate, and civil investigations.
This course will provide instruction related to the acquisition of mobile devices using EnCase™ Forensic followed by the examination via the use of EnCase™ Mobile Investigator (as well as EnCase™ Forensic).
The course will detail performing acquisitions from both a handset and a device backup followed by examination of devices running the mobile operating systems Android and Apple iOS.
During class the automated examination functionality of EnCase™ Mobile Investigator / EnCase™ Forensic will be used as well as manual examination and via EnScript™ programs of file types, including SQLite databases and Apple property lists.
DF210 – Building an Investigation With EnCase
This hands-on course is designed for investigators with strong computer skills, prior computer forensics training, and experience using the OpenText™ EnCase™ software (EnCase). This course builds upon the skills covered in the DF120–Foundations in Digital Forensics course and enhances the examiner’s ability to work efficiently using the unique features of EnCase™. During this course, students will build an investigation using analysis techniques, such as recovering deleted volumes, registry analysis, Recycle Bin examination, and examining compound files. Other analysis techniques, such as searching unallocated clusters, parsing current Windows artifacts, examining email and Internet artifacts, and analysing USB device artifacts will be included.
Students must understand EnCase™ Forensic concepts, the structure of the evidence file, creating and using case files, and data acquisition and basic analysis methods. It is also important that the students are familiar with the methods for recovering deleted files and folders in a FAT environment, conducting indexed queries and keyword searches across logical and physical media, creating, and using EnCase™ bookmarks, file signature analysis, and exporting evidence.
DF320 – Advanced Analysis of Windows Artifacts with EnCase
This hands-on course is designed for examiners with solid computer skills, seeking to learn advanced concepts in analysing Windows artifacts. The participants will be provided instruction that includes parsing and analysis techniques on registry data, volume shadow service, random access memory, zip file structures, prefetch, and SQLite content
DF420 – EnCase Examinations of the Macintosh Operating Systems
The introduction of the iPod, iPhone, and iPad and the use of Intel-based processors have generated a steep increase in the sales of Macintosh computers, which are no longer restricted to the realm of desktop publishing and computer-aided design. Computer users are attracted by the design of the Macintosh, its UNIX-like stability, ease-of-use, and its ability to run Microsoft® Windows. Most die-hard Windows users will refuse to return their Mac once they’ve started using it.