Sei sulla pagina 1di 7

PRINCE2 FOUNDATION COURSE

Projects IN a Controlled Environment (PRINCE2) embodies established and proven best practices and
governance for project management. It can be applied to any type of project and can easily be implemented
alongside specialist, industry-specific models.
Because the method is widely recognized and understood, it provides a common vocabulary for all project
participants - promoting effective communication. The method also provides for the explicit recognition of project
responsibilities - so that participants understand each other's roles and needs. There is a defined structure for
accountability, delegation, authority and communication.
About the Program
Projects fail for a variety of reasons including poor planning, lack of defined quality criteria, poor understanding of the
business drivers, inadequate control and lack of senior management involvement - in other words lack of a
structured, best-practice approach to project delivery.
PRINCE2 is process-based approach for project management that provides an easily-tailored and scalable
methodology for the management of all types of projects.
The goals of this three-day course are to provide you with a thorough grounding in the PRINCE2 methodology which offers a structured, best-practice approach - and to prepare you to take the PRINCE2 Foundation exam.
Who Should Attend
This accredited course is suitable for any organization or individual requiring a controlled and completely scalable
approach to managing projects. It is particularly suited to individuals newlyappointed to project roles or those wishing
to gain formal qualifications after previous project management experience. The course would be of benefit to those
with project support office or project assurance roles, project board members who wish to be hands-on and team
members aspiring to a more senior role.
Performance Focus

Identifying the PRINCE2 principles, themes, processes, techniques and management


products and how they work together

Tailoring PRINCE2 to best meet your project needs

Preparing to take and pass the PRINCE2 Foundation exam


What You Will Learn
Youll learn how to:

Identify the benefits and principles underlying a structured approach to project


management

Define the PRINCE2 method in-depth, including its principles, themes and
processes

Prepare and practice for the PRINCE2 Foundation exam


Course Overview
Getting Started

Introductions

Course structure

Course goal and objectives


Overview of PRINCE2

Structure (principles, themes, processes and tailoring) and benefits of PRINCE2

Key management products

Overview of the PRINCE2 Foundation and Practitioner exams


PRINCE2 Principles and Concepts

Continued business justification

Learn from experience


Define roles and responsibilities

Manage by stages

Manage by exception

Focus on products

Tailor to suit the project environment


PRINCE2 2009 Themes

Business Case

Organization

Quality

Plans

Risk

Change

Progress
PRINCE2 Processes

The PRINCE2 process model mapped to the four levels of management

The PRINCE2 process model Starting up a Project (SU), Initiating a Project (IP), Directing a Project (DP),

Controlling a Stage (CS), Managing Product Delivery (MP), Managing a Stage Boundary (SB), Closing a
Project (CP)
PRINCE2 Foundation Exam Preparation

Review of and practice with APMG sample questions and test papers

PRINCE2 Foundation Exam


About the Foundation Exam

Multiple choice format


75 questions per paper
5 questions to be trial and not counted in scores
35 marks required (out of 70 available) to pass - 50%

CHFI: Computer Hacking Forensic Investigator V8 Course Outline


1.

2.

Module 01: Computer Forensics in Today's World


1.

Forensics Science

2.

Computer Forensics

3.

Forensics Readiness

4.

Cyber Crime

5.

Cost Expenditure Responding to the Security Incident

6.

Cyber Crime Investigation

7.

Corporate Investigations

8.

Reporting a Cyber Crime

Module 02: Computer Forensics Investigation Process


1.

Investigating Computer Crime

3.

4.

5.

2.

Evaluate and Secure the Scene

3.

Collect the Evidence

4.

Secure the Evidence

5.

Acquire the Data

6.

Analyze the Data

7.

Assess Evidence and Case

8.

Prepare the Final Report

9.

Testifying as an Expert Witness

Module 03: Searching and Seizing Computers


1.

Searching and Seizing Computers without a Warrant

2.

Searching and Seizing Computers with a Warrant

3.

The Electronic Communications Privacy Act

4.

Electronic Surveillance in Communications Networks

5.

Evidence

Module 04: Digital Evidence


1.

Digital Data

2.

Types of Digital Data

3.

Rules of Evidence

4.

Electronic Devices: Types and Collecting Potential Evidence

5.

Digital Evidence Examination Process

6.

Electronic Crime and Digital Evidence Consideration by Crime Categor

Module 05: First Responder Procedures


1.

Electronic Evidence

2.

First Responder

3.

Roles of First Responder

4.

Electronic Devices: Types and Collecting Potential Evidence

5.

First Responder Toolkit

6.

First Response Basics

7.

Securing and Evaluating Electronic Crime Scene

8.

Conducting Preliminary Interviews

9.

Documenting Electronic Crime Scene

10.

Collecting and Preserving Electronic Evidence

11.

Packaging and Transporting Electronic Evidence

12.

Reporting the Crime Scene

13.

Note Taking Checklist

14.

6.

7.

8.

9.

First Responder Common Mistakes

Module 06: Computer Forensics Lab


1.

Setting a Computer Forensics Lab

2.

Investigative Services in Computer Forensics

3.

Computer Forensics Hardware

4.

Computer Forensics Software

Module 07: Understanding Hard Disks and File Systems


1.

Hard Disk Drive Overview

2.

Disk Partitions and Boot Process

3.

Understanding File Systems

4.

RAID Storage System

5.

File System Analysis Using The Sleuth Kit (TSK)

Module 08: Windows Forensics


1.

Collecting Volatile Information

2.

Collecting Non-volatile Information

3.

Windows Memory Analysis

4.

Windows Registry Analysis

5.

Cache, Cookie, and History Analysis

6.

MD5 Calculation

7.

Windows File Analysis

8.

Metadata Investigation

9.

Text Based Logs

10.

Other Audit Events

11.

Forensic Analysis of Event Logs

12.

Windows Password Issues

13.

Forensic Tools

Module 09: Data Acquisition and Duplication


1.

Data Acquisition and Duplication Concepts

2.

Data Acquisition Types

3.

Disk Acquisition Tool Requirements

4.

Validation Methods

5.

RAID Data Acquisition

6.

Acquisition Best Practices

7.

Data Acquisition Software Tools

8.

Data Acquisition Hardware Tools

10.

11.

12.

13.

Module 10: Recovering Deleted Files and Deleted Partitions


1.

Recovering the Deleted Files

2.

File Recovery Tools for Windows

3.

File Recovery Tools for MAC

4.

File Recovery Tools for Linux

5.

Recovering the Deleted Partitions

6.

Partition Recovery Tools

Module 11: Forensics Investigation using AccessData FTK


1.

Overview and Installation of FTK

2.

FTK Case Manager User Interface

3.

FTK Examiner User Interface

4.

Starting with FTK

5.

FTK Interface Tabs

6.

Adding and Processing Static, Live, and Remote Evidence

7.

Using and Managing Filters

8.

Using Index Search and Live Search

9.

Decrypting EFS and other Encrypted Files

10.

Working with Reports

Module 12: Forensics Investigation Using EnCase


1.

Overview of EnCase Forensic

2.

Installing EnCase Forensic

3.

EnCase Interface

4.

Case Management

5.

Working with Evidence

6.

Source Processor

7.

Analyzing and Searching Files

8.

Viewing File Content

9.

Bookmarking Items

10.

Reporting

Module 13: Steganography and Image File Forensics


1.

Steganography

2.

Steganography Techniques

3.

Steganalysis

4.

Image Files

5.

Data Compression

14.

15.

16.

17.

18.

6.

Locating and Recovering Image Files

7.

Image File Forensics Tools

Module 14: Application Password Crackers


1.

Password Cracking Concepts

2.

Types of Password Attacks

3.

Classification of Cracking Software

4.

Systems Software vs. Applications Software

5.

System Software Password Cracking

6.

Application Software Password Cracking

7.

Password Cracking Tools

Module 15: Log Capturing and Event Correlation


1.

Computer Security Logs

2.

Logs and Legal Issues

3.

Log Management

4.

Centralized Logging and Syslogs

5.

Time Synchronization

6.

Event Correlation

7.

Log Capturing and Analysis Tools

Module 16: Network Forensics, Investigating Logs and Investigating Network


Traffic
1.

Network Forensics

2.

Network Attacks

3.

Log Injection Attacks

4.

Investigating and Analyzing Logs

5.

Investigating Network Traffic

6.

Traffic Capturing and Analysis Tools

7.

Documenting the Evidence Gathered on a Network

Module 17: Investigating Wireless Attacks


1.

Wireless Technologies

2.

Wireless Attacks

3.

Investigating Wireless Attacks

4.

Features of a Good Wireless Forensics Tool

5.

Wireless Forensics Tools

6.

Traffic Capturing and Analysis Tools

Module 18: Investigating Web Attacks

19.

20.

21.

22.

1.

Introduction to Web Applications and Webservers

2.

Web Logs

3.

Web Attacks

4.

Web Attack Investigation

5.

Web Attack Detection Tools

6.

Tools for Locating IP Address

Module 19: Tracking Emails and Investigating Email Crimes


1.

Email System Basics

2.

Email Crimes

3.

Email Headers

4.

Steps to Investigate

5.

Email Forensics Tools

6.

Laws and Acts against Email Crimes

Module 20: Mobile Forensics


1.

Mobile Phone

2.

Mobile Operating Systems

3.

Mobile Forensics

4.

Mobile Forensic Process

5.

Mobile Forensics Software Tools

6.

Mobile Forensics Hardware Tools

Module 21: Investigative Reports


1.

Computer Forensics Report

2.

Computer Forensics Report Template

3.

Investigative Report Writing

4.

Sample Forensics Report

5.

Report Writing Using Tools

Module 22: Becoming an Expert Witness


1.

Expert Witness

2.

Types of Expert Witnesses

3.

Computer Forensics Experts

4.

Scope of Expert Witness Testimony

5.

Evidence Processing

6.

Rules for Expert Witness

7.

General Ethics While Testifying

Potrebbero piacerti anche