Online Training

Mastering Digital Forensics: Strengthening Public Sector Cybersecurity and Incident Response 

Empower. Investigate. Protect. – Building Cyber Resilience Through Digital Forensics.

25 and 27 February 2025

10:00am - 4:00pm AEDT

Next intake: 25 and 27 February 2025 | 10:00am - 4:00pm AEDT

Overview

Cyber incidents are escalating at an alarming rate, placing immense pressure on organisations to strengthen their defences. The Australian Cyber Security Centre reported a 13% surge in cybercrime in 2023, with over 76,000 incidents affecting public and private sectors and costing the economy more than $3.1 billion annually. These figures highlight the urgent need for a skilled workforce capable of tackling emerging threats. 

 Digital forensics is a cornerstone in the fight against cybercrime, empowering organisations to investigate incidents, uncover vulnerabilities, and enhance response strategies. Beyond its investigative role, digital forensics ensures data integrity, supports legal compliance, and enables proactive risk management. By equipping professionals with these critical skills, organisations can bolster resilience, safeguard their assets, and maintain trust in the face of evolving cyber challenges. 

Who Should Attend?

This course is designed for public sector professionals involved in cybersecurity, IT operations, compliance, and risk management, including APS 5 to EL 2 levels such as IT Security Analysts, Incident Response Officers, and Policy Managers, as well as SES executives like CIOs and Cybersecurity Managers. It also caters to State and Local Government employees, from operational staff (Level 5-7) like Digital Forensics Specialists, to mid-management (Level 7-9) such as Risk and Compliance Managers, and senior leaders (Level 10+) overseeing critical infrastructure and IT governance. This course is suitable for professionals who:
Have a foundational knowledge of IT systems or networks.
Are looking to build skills in digital forensics, incident response, or cybersecurity.
Work in roles related to IT security, risk management, or compliance.

Learning Outcomes

Foundational Principles: Understanding the key concepts and processes of digital forensics
Evidence Collection and Preservation: Mastering best practices to ensure data integrity and legal compliance
Data Analysis and Recovery: Using specialised tools to recover deleted data and analyse digital evidence from various devices
Incident Management: Applying forensic skills to real-world scenarios involving networks, mobile devices, and malware
Effective Communication: Presenting forensic findings clearly and professionally for legal proceedings and internal reporting

Online Training

Mastering Digital Forensics: Strengthening Public Sector Cybersecurity and Incident Response 


Session details

  • Swift Incident Response: Gain the skills to investigate breaches effectively, reduce downtime, and respond to incidents with speed and accuracy, ensuring minimal impact on operations. 
  • Ensure Compliance: Meet the demands of privacy laws like the Australian Privacy Act by mastering best practices for evidence handling and presenting legally sound findings. 
  • Strengthen Resilience: Safeguard your organisation with proactive measures against evolving threats, from ransomware to insider attacks, by building in-house forensic capabilities. 
  • Save Costs, Reduce Risks: Reduce reliance on costly consultants and mitigate financial and reputational risks by empowering your team to identify vulnerabilities and prevent future incidents. 
View course modules

Level: Intermediate

Some familiarity with topic is recommended

Key Sessions

  • What is digital forensics
  • Aims of digital forensics
  • Understand the digital forensic process: how to prepare for digital investigations and the difference between public-sector and private-sector investigations
  • Introduction to Australian Government Investigation Standards
  • Role of digital forensics in governments and organisations
  • How to conduct and manage a digital forensics investigation by taking a systematic approach
  • Requirements for data recovery: equipment, workstation, software

 

  • Principles / Rules for the conduct of a Digital Forensics Investigation
  • Understanding, identifying and preserving digital evidence
  • Rules of Evidence and Chain of Custody
  • Documentation and Case Management
  • Compliance requirements: The PPTT approach to Digital Forensics: Policy, Process, Technology, Training
  • Starting the Digital Forensics Process:
  • Conduct and management of a digital forensics investigation by taking a systematic process approach
  • Where to commence
  • Starting the Digital Forensics Process
  • Conduct and management of a digital forensics investigation by taking a systematic process approach
  • Where to commence

  • File system analysis and keyword searching
  • Timeline Analysis and reconstruction
  •  Data carving and recovery of fragmented files
  • Understanding file systems and their structure
  •  Recovering deleted and hidden data
  • Describe digital evidence storage formats
  • Understand how to plan for a digital forensics acquisition
  • Describe contingency planning for data acquisitions
  • Explain how to use acquisition tools
  • Describe how to validate data acquisitions
  • Describe RAID acquisition methods
  • List other forensics tools available for data acquisitions

  •  Describe the components of mobile devices and cellular networks
  • Explain mobile device evidence sources
  • Describe mobile device security features
  • Explain mobile device acquisition processes
  • Describe how to extract and analyze mobile device evidence
  • Describe mobile device forensics tools
  • Network traffic analysis and log examination

  • The role of email and social media in investigations
  • Describe client and server roles in email
  • Describe tasks in investigating email crimes and violations
  • Use of email server logs
  • Describe some specialised email forensics tools
  • How to apply digital forensics methods to investigating social media communications and channel-based messaging too

  • Steps and process to reporting
  • Confirmation of findings: differences between information and evidence
  • Writing forensics reports and documenting findings
  • Quality control and peer review of report including legal review
  • Explain the importance of reports and testimony and preparing to testify
  • Guidelines for report writing
  • Describe procedures for generating report findings and writing a digital forensics report
  • Explain the preparation necessary for testifying as a fact witness or an expert witness
  • Describe guidelines for testifying in court and in depositions/statements

Meet Your Facilitator

Philip Wagner

Principal Cyber Security Specialist and Educator G.P.Wagner Pty. Ltd

Philip Wagner is a cyber security, leadership educator, trainer, executive coach and project/program manager, with extensive leadership and project management expertise in both civilian and military environments.

He has advised and trained in a wide range of industries from banking and finance, education and training, technology and government at federal and state levels.

His most recent roles were as the Director Cyber Security and Deputy Chief Information Security Officer with the National Disability Insurance Agency and as a Senior Project Manager for a major Australian Health provider in developing their Cyber program. 

Register Today

Join this training for professionals working within the Public Sector

Pay for individual courses

Early Bird

Ends 24 Jan

$A 1395

per person + tax $200 saving

 

Regular

Ends 24 Feb

$A 1595

per person + tax

Additional discounts are available for group registrations of 10 or more. For group or payment enquiries or custom training solutions, please contact [email protected]

Customised in-house options available for teams

Interested in any of our online trainings?

You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.

Enquire here for more information

Can't see what you need?

Download our training catalogue to review all available topics

Download full catalogue

Get in Touch

Empowering the public sector with meaningful actionable advice to help solve the problems worth solving. If you would like to do an in-house course, please get in touch.

Request the training catalogue

To receive a PDF copy of the Public Sector Academy training catalogue, please submit the details below:

By submitting your email address, you are consenting to Public Sector Network potentially reaching out to you about the academy offering.

Achieve great value with our customised subscription plans