{"id":111,"date":"2023-03-22T10:40:29","date_gmt":"2023-03-22T10:40:29","guid":{"rendered":"https:\/\/e5hforensics.com\/?page_id=111"},"modified":"2023-11-19T18:15:13","modified_gmt":"2023-11-19T18:15:13","slug":"forensic-techniques-for-auditors","status":"publish","type":"page","link":"https:\/\/e5hforensics.com\/index.php\/training\/forensic-techniques-for-auditors\/","title":{"rendered":"Forensic Techniques for Auditors"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-zeever-secondary-color has-text-color\">Forensic Techniques for Auditors<\/h2>\n\n\n\n<p>A 1-day course designed to provide auditors and IT staff with an in-depth understanding of various forensic techniques which can be used to supplement their internal audit processes. The course covers the key principles of digital forensics. Participants will learn how to correctly handle electronic data, forensically preserve and extract data, and locate evidence using open source and free tools. Furthermore, participants will gain practical hands-on experience in applying these techniques in actual audit scenarios.<\/p>\n\n\n\n\n\n<h4 class=\"wp-block-heading has-zeever-secondary-color has-text-color\">Aim<\/h4>\n\n\n\n<p>This course will equip participants with the necessary skills and knowledge to supplement their internal audits processes by using the latest forensic techniques.<\/p>\n\n\n\n\n\n<h4 class=\"wp-block-heading has-zeever-secondary-color has-text-color\">Outcome<\/h4>\n\n\n\n<p>Upon completion of the course, participants will have a strong understanding of how to use digital forensic techniques to supplement their internal audit processes.<\/p>\n\n\n\n\n\n<h4 class=\"wp-block-heading has-zeever-secondary-color has-text-color\">Course Content<\/h4>\n\n\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Forensic Techniques for Auditors A 1-day course designed to provide auditors and IT staff with an in-depth understanding of various forensic techniques which can be used to supplement their internal audit processes. The course covers the key principles of digital forensics. Participants will learn how to correctly handle electronic data, forensically preserve and extract data, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":97,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-111","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":21,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/111\/revisions"}],"predecessor-version":[{"id":828,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/111\/revisions\/828"}],"up":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/97"}],"wp:attachment":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/media?parent=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}