Network Forensics Expert

The detection, investigation and preservation of evidence or electronic evidence that can be used to defend the company against possible criminal liability is known as COMPUTER FORENSICS. This discipline is mainly divided into several processes which can be developed either independently or in sequence, depending on the needs of the company.

If the student has no knowledge of computer security it is recommended to take the course Computer Security Introduction before this.

Image source: modification of "Hard Disc Crash" by Barney Livingstone

  1. Forensic analysis field: Types and methodologies
  2. Data Recovery:
    • Introduction
    • NTFS
    • EXT
    • LAB 2.1: File resurrecting
  3. Device Analysis
    • Live Analysis
    • Post-mortem Analysis
    • LAB 3.1: Autopsy Analysis
  4. Binary Analysis
    • Environment analysis
    • Code analysis
    • LAB 4.1: Malicious Code
Benefits for the students 
  • Develop the ability to understand and to execute forensic analysis of systems, devices and networks.
  • Get the qualified Accreditation in Network Security Manager inLab FIB after fulfilling the other requirements.
  • Know the different types and methods of forensic analysis for effective practice.
  • Acquire a theoretical and practical knowledge highly valued by the market and ICT departments of all public and private organizations.
To whom it is addressed 
  • Managers and technical of computer security of ICT departments of organizations who want to keep up in forensic auditing systems, devices and networks.
  • Students of Computer Science or Telecommunications who want to focus their professional career in the area of computer security.
  • Any professional who meet the minimum requirements of knowledge, interested in expanding their knowledge and skills in an area of increasing importance as is the Cybersecurity.

Segueix-nos a

Els nostres articles del bloc d'inLab FIB


inLab FIB incorporates esCert


First LogoCSIRT Logo

inLab is member of

inLab és centre TECNIO