AccessData Forensic Toolkit (FTK) Imager
by Phil Chapman
This course will teach you how to install, configure and use FTK Imager to obtain, mount, and analyze evidence as part of a computer incident investigation.
What you'll learn
FTK Imager is a widely used tool in forensic investigation. In this course, AccessData Forensic Toolkit (FTK) Imager, you’ll learn to how to quickly and accurately acquire and examine evidence as part of a computer related investigation. First, you’ll explore how to install and configure FTK Imager. Next, you’ll discover how to acquire a variety of image types and maintain the integrity of the original data. Finally, you’ll learn how to safely mount and examine the collected data and analyze captured evidence. When you’re finished with this course, you’ll have the skills and knowledge of using FTK Imager needed to be confident in the process of forensically imaging and analyzing collected data as part of an investigation.
About the author
Phil Chapman is a senior instructor. He is responsible for the delivery of a range of courses including official Microsoft, CompTIA, EC Council and BCS official certifications. He is also
the subject matter expert and project lead for the bespoke Law Enforcement Cyber Security training packages which are delivered to UK Law Enforcement agencies and forces. He holds a variety of IT Technical and Security qualifications across many fields.
Phil spent 23 years in the Royal Air Force as an Intellige... morence Analyst working across the world in support of Signals and Human Intelligence operations. He worked mostly for GCHQ
agencies but also supported UK counter terrorism agencies and security services during his career. He also spent 5 years as a military trainer delivering courses in analysis, security and
intelligence gathering and reporting.
In 2007 Phil left the RAF and began a career as a training consultant, initially within a Microsoft Academy and then as a freelance consultant/trainer working across Europe in
support of multiple companies and organisations. He is now a permanent trainer and continues to deliver and develop training packages in support of the cyber security apprenticeship, law enforcement and commercial courses run in the UK and Europe. He is actively involved the Prepare, Protect and Prevent strategies working alongside UK law
enforcement agencies and advises as an SME to several UK based Cyber Crime Units.