{"id":111,"date":"2023-03-22T10:40:29","date_gmt":"2023-03-22T10:40:29","guid":{"rendered":"https:\/\/e5hforensics.com\/?page_id=111"},"modified":"2023-11-19T18:15:13","modified_gmt":"2023-11-19T18:15:13","slug":"forensic-techniques-for-auditors","status":"publish","type":"page","link":"https:\/\/e5hforensics.com\/index.php\/training\/forensic-techniques-for-auditors\/","title":{"rendered":"Forensic Techniques for Auditors"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-zeever-secondary-color has-text-color\">Forensic Techniques for Auditors<\/h2>\n\n\n\n<p>A 1-day course designed to provide auditors and IT staff with an in-depth understanding of various forensic techniques which can be used to supplement their internal audit processes. The course covers the key principles of digital forensics. Participants will learn how to correctly handle electronic data, forensically preserve and extract data, and locate evidence using open source and free tools. Furthermore, participants will gain practical hands-on experience in applying these techniques in actual audit scenarios.<\/p>\n\n\n\n<div class=\"section-wrapper\" data-id=\"avuSZm\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-avuSZm layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-EL6hXI\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"EL6hXI\"><div class=\"guten-column-wrapper\">\n<div style=\"height:62px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-zeever-secondary-color has-text-color\">Aim<\/h4>\n\n\n\n<p>This course will equip participants with the necessary skills and knowledge to supplement their internal audits processes by using the latest forensic techniques.<\/p>\n\n\n\n<div class=\"section-wrapper\" data-id=\"Og6jN6\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-Og6jN6 layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-jaNu2p\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"jaNu2p\"><div class=\"guten-column-wrapper\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-zeever-secondary-color has-text-color\">Outcome<\/h4>\n\n\n\n<p>Upon completion of the course, participants will have a strong understanding of how to use digital forensic techniques to supplement their internal audit processes.<\/p>\n\n\n\n<div class=\"section-wrapper\" data-id=\"egK0G2\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-egK0G2 layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Ru3q20\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"Ru3q20\"><div class=\"guten-column-wrapper\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-zeever-secondary-color has-text-color\">Course Content<\/h4>\n\n\n\n<div class=\"section-wrapper\" data-id=\"S5ABxt\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-S5ABxt layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-PzninA\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"PzninA\"><div class=\"guten-column-wrapper\">\n<div class=\"section-wrapper\" data-id=\"9GXxdJ\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-9GXxdJ layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Z6E3lS\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"Z6E3lS\"><div class=\"guten-column-wrapper\">\n<ul class=\"wp-block-list\">\n<li>Introduction<\/li>\n\n\n\n<li>Define Digital Forensics<\/li>\n\n\n\n<li>Legal Consideration<\/li>\n\n\n\n<li>Evidence Handling &amp; Chain of Custody<\/li>\n\n\n\n<li>How Courts Assess the Reliability of Digital Evidence<\/li>\n\n\n\n<li>Good Practice Guidelines for Digital Evidence<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-2fQoS8\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"2fQoS8\"><div class=\"guten-column-wrapper\">\n<ul class=\"wp-block-list\">\n<li>The Four Principles of Computer Based Evidence<\/li>\n\n\n\n<li>Forensic Acquisitions<\/li>\n\n\n\n<li>Forensic Acquisition Tools<\/li>\n\n\n\n<li>Windows Registry<\/li>\n\n\n\n<li>Identifying Installed Software<\/li>\n\n\n\n<li>Volume Shadow Copies<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-TrPazf\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"TrPazf\"><div class=\"guten-column-wrapper\">\n<ul class=\"wp-block-list\">\n<li>Identifying Executed Programs<\/li>\n\n\n\n<li>Link File Analysis<\/li>\n\n\n\n<li>USB Forensics<\/li>\n\n\n\n<li>Searching the Registry<\/li>\n\n\n\n<li>Event Logs<\/li>\n\n\n\n<li>Summary<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"PHSLs6\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-PHSLs6 layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-ExtsZq\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"ExtsZq\"><div class=\"guten-column-wrapper\">\n<div style=\"height:57px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"ioxhgp\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-ioxhgp layout-boxed align-stretch\"><div class=\"guten-background-overlay\"><\/div><div class=\"guten-shape-divider guten-shape-divider-top\"><\/div><div class=\"guten-shape-divider guten-shape-divider-bottom\"><\/div><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-5yo0ft\"><div class=\"guten-background-overlay\"><\/div><div class=\"sticky-wrapper\" data-id=\"5yo0ft\"><div class=\"guten-column-wrapper\">\n<div class=\"guten-element guten-button-wrapper guten-UOx70f\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/e5hforensics.com\/wp-content\/uploads\/2023\/03\/Forensic-Techniques-for-Auditors-Course-Information.pdf\"><span>Download<\/span><\/a><\/div>\n<\/div><\/div><\/div>\n<\/div><\/section><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Forensic Techniques for Auditors A 1-day course designed to provide auditors and IT staff with an in-depth understanding of various forensic techniques which can be used to supplement their internal audit processes. The course covers the key principles of digital forensics. Participants will learn how to correctly handle electronic data, forensically preserve and extract data, and locate evidence using open source and free tools. Furthermore, participants will gain practical hands-on experience in applying these techniques in actual audit scenarios. Aim This course will equip participants with the necessary skills and knowledge to supplement their internal audits processes by using the<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":97,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-111","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":21,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/111\/revisions"}],"predecessor-version":[{"id":828,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/111\/revisions\/828"}],"up":[{"embeddable":true,"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/pages\/97"}],"wp:attachment":[{"href":"https:\/\/e5hforensics.com\/index.php\/wp-json\/wp\/v2\/media?parent=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}