$3,299.00
Date | Day | Time | Duration |
4 Mar | Monday | 09:00 to 17:00 CST/GMT+8 | 8 Hours |
5 Mar | Tuesday | 09:00 to 17:00 CST/GMT+8 | 8 Hours |
6 Mar | Wednesday | 09:00 to 17:00 CST/GMT+8 | 8 Hours |
Trainees will follow an end-to-end DFIR process model from planning and tooling, to defensible procedures, to triage & analysis. Despite using low-cost tools (often with rough edges), this course emphasizes defensible procedures, upholding evidence integrity and chain-of-custody, such that acquired evidences and findings may be admissible for legal proceedings.
Armed with the knowledge gained from this course, trainees would be able to apply the skills and knowledges to competently perform DFIR in a defensible manner when resources are strained.
Alan has ample experience handling complex dispute and litigation cases, having served as forensic examiner, e-discovery specialist, and expert witness testified before courts of laws, at multiple top-tier multinational forensic firms.
As an digital forensics and incident response expert Alan is well respected for his deep understanding of technologies, acquired through years of diverse background in network & infrastructure security, IT audit & penetration testing, and security solution architecture & design, across nearly two decades of deeply technical engagements.
He has presented at PacSec Tokyo (2013), DEFCON (2012), and HTCIA Asia-Pacific Conference (2012). Alan is a holder of CFE, OSCE3 (OSEP, OSWE, OSED), OSCP, OSDA, OSWA, EnCE, CISA, and GREM.
Captain (a.k.a. Forensics and Hardware Ninja) is an independent security researcher. He focuses on hardware, UAS (Drone) security researches, and digital forensics analysis. He was the first and the only Asian who led a group of white-hat hackers to hold an in-depth, hands-on drone and hardware hacking village in BLACK HAT and DEFCON. He was also a frequent speaker and trainer in different top-notch security and forensics conferences including SANS, HTCIA, DFRWS, GCC, CodeBlue, HITB, SINCON, AVTokyo and HITCON.