The SuperPuters Network
SuperPuters certifies that the individual has the knowledge, skills, and abilities to utilize state-of-the-art forensic analysis techniques to solve complicated Windows- and Linux-based investigations.
SuperPuters experts can articulate complex forensic concepts such as the file system structures, enterprise acquisition, complex media analysis, and memory analysis.
SuperPuters is front line investigators during computer intrusion breaches across the enterprise.
They can help identify and secure compromised systems even if the adversary uses anti-forensic techniques.
Using advanced techniques such as file system timeline analysis, registry analysis, and memory inspection,
SuperPuters is adept at finding unknown malware, rootkits, and data that the intruders thought had eliminated from the system.
This certification will ensure you have a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases.
SuperPuters certification tests knowledge that is not geared for only law enforcement personnel, but for corporate and organizational incident response and investigation teams that have different legal or statutory requirements compared to a standard law enforcement forensic investigation.
•Acquiring Data and Evidence
•Application Foot printing
•Autopsy Forensic Browser
•Computer Forensics Primer
•Critical Analysis Tools
•File Name Layer
•File System and Data Layer Tools
•Forensic Imaging and File system Media Analysis
•Forensic Investigation Process
•Hash Comparisons and Fuzzy Hashing
•Linux File System Basics
•Unallocated Metadata and File Content Types
•Windows FAT File System Basics
•Windows File System Basics
•Windows Live Imaging
•Windows Media Analysis
•Windows Media and Artifact Analysis
•Windows NTFS File System Basics
•Windows Response and Volatile Evidence Collection
•Advanced Forensic Evidence Acquisition and Imaging
•File System Timeline Analysis
•Super Timeline Analysis
•Live Incident Response and Volatile Evidence Collection
•Advanced Windows Registry Analysis
•Discovering Malware on a Host
•Recovering Key Windows Files
•Application Foot printing and Software Forensics
Web Site Design & SEO by SuperPuters © copyright SUPERPUTERS Inc. 1998-2013 All Rights Reserved