Online Training
Mastering Digital Forensics: Strengthening Public Sector Cybersecurity and Incident Response
Empower. Investigate. Protect. – Building Cyber Resilience Through Digital Forensics.
25 and 27 February 2025
10:00am - 4:00pm AEDT
Next intake: 25 and 27 February 2025 | 10:00am - 4:00pm AEDT
Overview
Cyber incidents are escalating at an alarming rate, placing immense pressure on organisations to strengthen their defences. The Australian Cyber Security Centre reported a 13% surge in cybercrime in 2023, with over 76,000 incidents affecting public and private sectors and costing the economy more than $3.1 billion annually. These figures highlight the urgent need for a skilled workforce capable of tackling emerging threats.
Digital forensics is a cornerstone in the fight against cybercrime, empowering organisations to investigate incidents, uncover vulnerabilities, and enhance response strategies. Beyond its investigative role, digital forensics ensures data integrity, supports legal compliance, and enables proactive risk management. By equipping professionals with these critical skills, organisations can bolster resilience, safeguard their assets, and maintain trust in the face of evolving cyber challenges.
Who Should Attend?
This course is designed for public sector professionals involved in cybersecurity, IT operations, compliance, and risk management, including APS 5 to EL 2 levels such as IT Security Analysts, Incident Response Officers, and Policy Managers, as well as SES executives like CIOs and Cybersecurity Managers. It also caters to State and Local Government employees, from operational staff (Level 5-7) like Digital Forensics Specialists, to mid-management (Level 7-9) such as Risk and Compliance Managers, and senior leaders (Level 10+) overseeing critical infrastructure and IT governance. This course is suitable for professionals who:Learning Outcomes
Online Training
Mastering Digital Forensics: Strengthening Public Sector Cybersecurity and Incident Response
Session details
- Swift Incident Response: Gain the skills to investigate breaches effectively, reduce downtime, and respond to incidents with speed and accuracy, ensuring minimal impact on operations.
- Ensure Compliance: Meet the demands of privacy laws like the Australian Privacy Act by mastering best practices for evidence handling and presenting legally sound findings.
- Strengthen Resilience: Safeguard your organisation with proactive measures against evolving threats, from ransomware to insider attacks, by building in-house forensic capabilities.
- Save Costs, Reduce Risks: Reduce reliance on costly consultants and mitigate financial and reputational risks by empowering your team to identify vulnerabilities and prevent future incidents.
Level: Intermediate
Some familiarity with topic is recommended
Key Sessions
- What is digital forensics
- Aims of digital forensics
- Understand the digital forensic process: how to prepare for digital investigations and the difference between public-sector and private-sector investigations
- Introduction to Australian Government Investigation Standards
- Role of digital forensics in governments and organisations
- How to conduct and manage a digital forensics investigation by taking a systematic approach
- Requirements for data recovery: equipment, workstation, software
- Principles / Rules for the conduct of a Digital Forensics Investigation
- Understanding, identifying and preserving digital evidence
- Rules of Evidence and Chain of Custody
- Documentation and Case Management
- Compliance requirements: The PPTT approach to Digital Forensics: Policy, Process, Technology, Training
- Starting the Digital Forensics Process:
- Conduct and management of a digital forensics investigation by taking a systematic process approach
- Where to commence
- Starting the Digital Forensics Process
- Conduct and management of a digital forensics investigation by taking a systematic process approach
- Where to commence
- File system analysis and keyword searching
- Timeline Analysis and reconstruction
- Data carving and recovery of fragmented files
- Understanding file systems and their structure
- Recovering deleted and hidden data
- Describe digital evidence storage formats
- Understand how to plan for a digital forensics acquisition
- Describe contingency planning for data acquisitions
- Explain how to use acquisition tools
- Describe how to validate data acquisitions
- Describe RAID acquisition methods
- List other forensics tools available for data acquisitions
- Describe the components of mobile devices and cellular networks
- Explain mobile device evidence sources
- Describe mobile device security features
- Explain mobile device acquisition processes
- Describe how to extract and analyze mobile device evidence
- Describe mobile device forensics tools
- Network traffic analysis and log examination
- The role of email and social media in investigations
- Describe client and server roles in email
- Describe tasks in investigating email crimes and violations
- Use of email server logs
- Describe some specialised email forensics tools
- How to apply digital forensics methods to investigating social media communications and channel-based messaging too
- Steps and process to reporting
- Confirmation of findings: differences between information and evidence
- Writing forensics reports and documenting findings
- Quality control and peer review of report including legal review
- Explain the importance of reports and testimony and preparing to testify
- Guidelines for report writing
- Describe procedures for generating report findings and writing a digital forensics report
- Explain the preparation necessary for testifying as a fact witness or an expert witness
- Describe guidelines for testifying in court and in depositions/statements
Meet Your Facilitator
Philip Wagner
Principal Cyber Security Specialist and Educator G.P.Wagner Pty. Ltd
Philip Wagner is a cyber security, leadership educator, trainer, executive coach and project/program manager, with extensive leadership and project management expertise in both civilian and military environments.
He has advised and trained in a wide range of industries from banking and finance, education and training, technology and government at federal and state levels.
His most recent roles were as the Director Cyber Security and Deputy Chief Information Security Officer with the National Disability Insurance Agency and as a Senior Project Manager for a major Australian Health provider in developing their Cyber program.
Register Today
Join this training for professionals working within the Public Sector
Regular
Ends 24 Feb
$A 1595
per person + taxAdditional discounts are available for group registrations of 10 or more. For group or payment enquiries or custom training solutions, please contact [email protected]
Customised in-house options available for teams
Interested in any of our online trainings?
You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.
Enquire here for more informationCan't see what you need?
Download our training catalogue to review all available topics
Download full catalogue