{"id":263,"date":"2020-02-21T18:24:40","date_gmt":"2020-02-21T17:24:40","guid":{"rendered":"http:\/\/www.forensee.cz\/?page_id=263"},"modified":"2021-03-30T12:44:03","modified_gmt":"2021-03-30T10:44:03","slug":"skoleni","status":"publish","type":"page","link":"https:\/\/www.forensee.cz\/en\/skoleni\/","title":{"rendered":"Training"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_image=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/03\/photo-of-man-sitting-in-front-3321791-Cropped.jpg&#8220; height=&#8220;500px&#8220; animation_style=&#8220;fade&#8220; background_last_edited=&#8220;on|phone&#8220; background_position_phone=&#8220;center&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;32px||||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; text_text_color=&#8220;#ffffff&#8220; header_text_color=&#8220;#ffffff&#8220; header_font_size=&#8220;50px&#8220; header_2_text_color=&#8220;#ffffff&#8220; text_orientation=&#8220;center&#8220; header_font_size_tablet=&#8220;45px&#8220; header_font_size_phone=&#8220;40px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; header_2_font_size_tablet=&#8220;22px&#8220; header_2_font_size_phone=&#8220;20px&#8220; header_2_font_size_last_edited=&#8220;on|tablet&#8220; header_2_line_height_tablet=&#8220;1.3em&#8220; header_2_line_height_phone=&#8220;1.3em&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; header_text_shadow_style=&#8220;preset5&#8243; header_2_text_shadow_style=&#8220;preset5&#8243;]<\/p>\n<h1><span style=\"color: #ffffff;\"><b>Training<\/b><\/span><\/h1>\n<p><span style=\"color: #ffffff;\">\u00a0<\/span><\/p>\n<p><span style=\"color: #ffffff;\">\u00a0<\/span><\/p>\n<h2>Training in digital forensic analysis and information security<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.0.4&#8243; text_text_color=&#8220;#ffffff&#8220; header_text_color=&#8220;#ffffff&#8220; header_font_size=&#8220;50px&#8220; header_2_text_color=&#8220;#ffffff&#8220; text_orientation=&#8220;center&#8220;]<\/p>\n<h2><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;rgba(0,0,0,0.07)&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; border_color_top=&#8220;#ff9500&#8243; border_color_bottom=&#8220;#ff9500&#8243;][et_pb_row _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;0px|auto|||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.9.2&#8243; text_text_color=&#8220;#000000&#8243; text_font_size=&#8220;16px&#8220; header_2_font=&#8220;||||||||&#8220; header_2_text_color=&#8220;#000000&#8243; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;1.3em&#8220; custom_margin=&#8220;10px||||false|false&#8220; hover_enabled=&#8220;0&#8243; text_orientation=&#8220;justified&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<h2>In the rapidly evolving segment of IT security, continuing education is key<\/h2>\n<p>Only few fields of human activity are evolving as fast as the information technology segment. And if we talk about the fact that IT technologies are evolving rapidly, then the field of information technology security is evolving rapidly as well. And in such a dynamically changing field, lifelong learning is a key prerequisite for success.<\/p>\n<p>The focus of the content of our trainings is on the issue of digital forensic analysis - from its complete foundations and managerial level, through daily routine to specialized activities. Our partnership with the world's leading manufacturers of specialized forensic HW and SW then allows us to offer product training focused on specific work with specific forensic tools. All our trainers have many years of experience in the field of practical performance of digital forensic analysis, processing of expert opinions, investigation of security incidents and eDiscovery.<\/p>\n<p>We also focus on training in the field of ISMS, especially on the practical application of ISO \/ IEC 27000 series standards and Act No. 181\/2014, on cyber security.<\/p>\n<p>The last group is popular-educational training focused on information security for non-professionals, therefore for professions outside of IT - whether they are managers, regular employees or self-employed or self-employed.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;#ff9500&#8243; width=&#8220;100%&#8220; max_height=&#8220;100px&#8220; custom_margin=&#8220;35px||||false|false&#8220; animation_style=&#8220;fade&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;#ff9500&#8243; custom_margin=&#8220;-40px||||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;#ff9500&#8243; custom_margin=&#8220;-1px||||false|false&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;-15px||||false|false&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; border_color_all=&#8220;#ff9500&#8243;]<\/p>\n<h2><strong><span style=\"color: #ffffff;\">Training in Digital Forensic Analysis<\/span><\/strong><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_row _builder_version=&#8220;4.9.2&#8243; custom_margin=&#8220;-50px|auto|||false|false&#8220; animation_style=&#8220;fade&#8220; hover_enabled=&#8220;0&#8243; sticky_enabled=&#8220;0&#8243;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_accordion open_toggle_background_color=&#8220;#ffffff&#8220; closed_toggle_background_color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.9.2&#8243; custom_margin=&#8220;||1px|||&#8220; hover_enabled=&#8220;0&#8243; box_shadow_style=&#8220;preset2&#8243; text_orientation=&#8220;justified&#8220; body_text_align=&#8220;justify&#8220; sticky_enabled=&#8220;0&#8243; toggle_text_align=&#8220;left&#8220; closed_toggle_text_align=&#8220;justify&#8220;][et_pb_accordion_item title=&#8220;Teorie digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy&#8220; open=&#8220;on&#8220; open_toggle_text_color=&#8220;#000000&#8243; open_toggle_background_color=&#8220;#ffffff&#8220; closed_toggle_text_color=&#8220;#000000&#8243; closed_toggle_background_color=&#8220;#ffffff&#8220; content_tablet=&#8220;<\/p>\n<p>Number of professionals who do not perform forensic analysis tasks themselves often encounter the issues of forensic analysis - whether they are lawyers, legal specialists, company managers, internal auditors or security experts. However, knowledge of the basics of forensic analysis is often crucial to the performance of their work.<\/p>\n<p>For professionals from related industries, we have prepared a more theoretically oriented course, designed for a basic understanding of the principles of digital forensics and its benefits for a specific profession. During the course you will learn the basic principles of forensic investigation and the procedures and methodologies applied in its implementation. You will gain insight into the issues of digital traces and the limits of their use, and learn about the specifics that distinguish them from other fields.<\/p>\n<p>The role of digital forensic analysis within the organization and its benefits will become clear, not only in relation to ISO \/ IEC 27 000 or the Cyber Security Act, but also in terms of the conditions for implementing digital forensic analysis processes in the organization. For legal specialists, there is a section focused on the role of digital forensic analysis in civil, criminal and work law issues and on understanding the issue of digital footprints from the point of view of law.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> management, IT admins, CIO ect.<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>Number of professionals who do not perform forensic analysis tasks themselves often encounter the issues of forensic analysis - whether they are lawyers, legal specialists, company managers, internal auditors or security experts. However, knowledge of the basics of forensic analysis is often crucial to the performance of their work.<\/p>\n<p>For professionals from related industries, we have prepared a more theoretically oriented course, designed for a basic understanding of the principles of digital forensics and its benefits for a specific profession. During the course you will learn the basic principles of forensic investigation and the procedures and methodologies applied in its implementation. You will gain insight into the issues of digital traces and the limits of their use, and learn about the specifics that distinguish them from other fields.<\/p>\n<p>The role of digital forensic analysis within the organization and its benefits will become clear, not only in relation to ISO \/ IEC 27 000 or the Cyber Security Act, but also in terms of the conditions for implementing digital forensic analysis processes in the organization. For legal specialists, there is a section focused on the role of digital forensic analysis in civil, criminal and work law issues and on understanding the issue of digital footprints from the point of view of law.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> management, IT admins, CIO ect.<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<\/p>\n<p>&#8220; content_last_edited=&#8220;on|tablet&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220;]<\/p>\n<table border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/shutterstock_794397187-kopie-300x175.jpg\" width=\"300\" height=\"175\" alt=\"\" class=\"wp-image-1064 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>Number of professionals who do not perform forensic analysis tasks themselves often encounter the issues of forensic analysis - whether they are lawyers, legal specialists, company managers, internal auditors or security experts. However, knowledge of the basics of forensic analysis is often crucial to the performance of their work.<\/p>\n<p>For professionals from related industries, we have prepared a more theoretically oriented course, designed for a basic understanding of the principles of digital forensics and its benefits for a specific profession. During the course you will learn the basic principles of forensic investigation and the procedures and methodologies applied in its implementation. You will gain insight into the issues of digital traces and the limits of their use, and learn about the specifics that distinguish them from other fields.<\/p>\n<p>The role of digital forensic analysis within the organization and its benefits will become clear, not only in relation to ISO \/ IEC 27 000 or the Cyber Security Act, but also in terms of the conditions for implementing digital forensic analysis processes in the organization. For legal specialists, there is a section focused on the role of digital forensic analysis in civil, criminal and work law issues and on understanding the issue of digital footprints from the point of view of law.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong>\u00a01 day<\/p>\n<p><strong>Suitable for:<\/strong> management, IT admins, CIO ect.<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Forenzn\u00ed anal\u00fdza prakticky&#8220; open_toggle_text_color=&#8220;#000000&#8243; open_toggle_background_color=&#8220;#ffffff&#8220; closed_toggle_text_color=&#8220;#000000&#8243; closed_toggle_background_color=&#8220;#ffffff&#8220; content_tablet=&#8220;<\/p>\n<p>Digital traces have specific characteristics based on their intangible nature. In order to properly secure digital traces, it is necessary to acquire a range of knowledge and procedures to ensure the integrity of the digital trace and its unquestionability for any further criminal, civil or labour law proceedings.<\/p>\n<p>Practically focused course Acquiring digital tracks will acquaint you with the most common sources of digital traces and with specialized HW and SW for their fast and reliable securing. You will learn the procedures for securing digital tracks and you will master the preparation necessary for these tasks with regard to the specifics of each type of digital traces. You will have the opportunity to try out the acquisition of key traces from running systems, as well as the acquisition of a forensic image of common types of storage media and process procedures for further handling and manipulation of this image. You will briefly get acquainted with a number of tools for subsequent analysis of secured data, where knowledge of their features is necessary for the correct and complete acquisition of digital traces.<\/p>\n<p><strong>Length:<\/strong> 2 days<\/p>\n<p><strong>Suitable for:<\/strong> forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites:<\/strong> recommended to take the course Theory of Digital Forensic Analysis<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>Digital traces have specific characteristics based on their intangible nature. In order to properly secure digital traces, it is necessary to acquire a range of knowledge and procedures to ensure the integrity of the digital trace and its unquestionability for any further criminal, civil or labour law proceedings.<\/p>\n<p>Practically focused course Acquiring digital tracks will acquaint you with the most common sources of digital traces and with specialized HW and SW for their fast and reliable securing. You will learn the procedures for securing digital tracks and you will master the preparation necessary for these tasks with regard to the specifics of each type of digital traces. You will have the opportunity to try out the acquisition of key traces from running systems, as well as the acquisition of a forensic image of common types of storage media and process procedures for further handling and manipulation of this image. You will briefly get acquainted with a number of tools for subsequent analysis of secured data, where knowledge of their features is necessary for the correct and complete acquisition of digital traces.<\/p>\n<p><strong>Length:<\/strong> 2 days<\/p>\n<p><strong>Suitable for:<\/strong> forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites:<\/strong> recommended to take the course Theory of Digital Forensic Analysis<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220; open=&#8220;off&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/shutterstock_1508063474-kopie-300x175.jpg\" width=\"300\" height=\"175\" alt=\"\" class=\"wp-image-1066 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>Digital traces have specific characteristics based on their intangible nature. In order to properly secure digital traces, it is necessary to acquire a range of knowledge and procedures to ensure the integrity of the digital trace and its unquestionability for any further criminal, civil or labour law proceedings.<\/p>\n<p>Practically focused course Acquiring digital tracks will acquaint you with the most common sources of digital traces and with specialized HW and SW for their fast and reliable securing. You will learn the procedures for securing digital tracks and you will master the preparation necessary for these tasks with regard to the specifics of each type of digital traces. You will have the opportunity to try out the acquisition of key traces from running systems, as well as the acquisition of a forensic image of common types of storage media and process procedures for further handling and manipulation of this image. You will briefly get acquainted with a number of tools for subsequent analysis of secured data, where knowledge of their features is necessary for the correct and complete acquisition of digital traces.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong> 2 days<\/p>\n<p><strong>Suitable for:<\/strong> forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites:<\/strong>\u00a0recommended to take the course Theory of Digital Forensic Analysis<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Forenzn\u00ed anal\u00fdza Windows&#8220; open_toggle_text_color=&#8220;#000000&#8243; closed_toggle_text_color=&#8220;#000000&#8243; content_tablet=&#8220;<\/p>\n<p>This course focuses on deepening your knowledge of the Windows operating system for the needs of digital forensics. The ability to understand operating system artifacts is one of the cornerstones of forensics and information security. Microsoft Windows is still the most widely used operating system in our country and is still the best source of information when detecting crime or resolving security incidents within an organization.<\/p>\n<p>The course covers advanced Windows system analysis, especially data analysis of the most used file systems - NTFS, ExFAT and FAT and their recovery, registry or Event Log analysis. The course shows the possibilities of analyzing other system data, such as prefetch or thumbs.db files. Part of the course is also devoted to RAM analysis, where the structure of storing information in the operating memory or the analysis of running processes is discussed.<\/p>\n<p><strong>Length:<\/strong> 4 days<\/p>\n<p><strong>Suitable for: <\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites: <\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>This course focuses on deepening your knowledge of the Windows operating system for the needs of digital forensics. The ability to understand operating system artifacts is one of the cornerstones of forensics and information security. Microsoft Windows is still the most widely used operating system in our country and is still the best source of information when detecting crime or resolving security incidents within an organization.<\/p>\n<p>The course covers advanced Windows system analysis, especially data analysis of the most used file systems - NTFS, ExFAT and FAT and their recovery, registry or Event Log analysis. The course shows the possibilities of analyzing other system data, such as prefetch or thumbs.db files. Part of the course is also devoted to RAM analysis, where the structure of storing information in the operating memory or the analysis of running processes is discussed.<\/p>\n<p><strong>Length:<\/strong> 4 days<\/p>\n<p><strong>Suitable for: <\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites: <\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; open=&#8220;off&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/shutterstock_315130838-kopie-300x175.jpg\" width=\"300\" height=\"175\" alt=\"\" class=\"wp-image-1070 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>This course focuses on deepening your knowledge of the Windows operating system for the needs of digital forensics. The ability to understand operating system artifacts is one of the cornerstones of forensics and information security. Microsoft Windows is still the most widely used operating system in our country and is still the best source of information when detecting crime or resolving security incidents within an organization.<\/p>\n<p>The course covers advanced Windows system analysis, especially data analysis of the most used file systems - NTFS, ExFAT and FAT and their recovery, registry or Event Log analysis. The course shows the possibilities of analyzing other system data, such as prefetch or thumbs.db files. Part of the course is also devoted to RAM analysis, where the structure of storing information in the operating memory or the analysis of running processes is discussed.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong> 4 days<\/p>\n<p><strong>Suitable for:\u00a0<\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites:\u00a0<\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Forenzn\u00ed anal\u00fdza macOS&#8220; open_toggle_text_color=&#8220;#000000&#8243; closed_toggle_text_color=&#8220;#000000&#8243; content_tablet=&#8220;<\/p>\n<p>The primary focus of this course is macOS digital forensics, but due to the interconnected ecosystem, it will also touch on the iOS mobile operating system in many topics. In general, the course content focuses not only on operating system analysis, but also on securing data from the operating system or forensic triage. Thus, the course also serves for a general understanding of how Apple devices work.<\/p>\n<p>The course explains a number of basic digital forensics tasks for Apple devices, the operation of APFS and HFS+ file systems and their specifics. The course also focuses on the analysis of SQLite or plist database files. It discusses in detail the special file artifacts that are a specialty of Apple devices. It teaches you how to work with Time Machine backups, or what you can get extra when a user uses Bootcamp. In addition to analyzing web browsers or photo metadata, the course will teach you how to work with Keychain, where passwords are stored, or Terminal commands that will come in handy during a forensic triage. We'll also discuss log files - Apple Unified Logs and Apple System Logs. The course also includes a description of how FSEvents or Spotlight search metadata works.<\/p>\n<p><strong>Length:<\/strong> 3 days<\/p>\n<p><strong>Suitable for: <\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites: <\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>The primary focus of this course is macOS digital forensics, but due to the interconnected ecosystem, it will also touch on the iOS mobile operating system in many topics. In general, the course content focuses not only on operating system analysis, but also on securing data from the operating system or forensic triage. Thus, the course also serves for a general understanding of how Apple devices work.<\/p>\n<p>The course explains a number of basic digital forensics tasks for Apple devices, the operation of APFS and HFS+ file systems and their specifics. The course also focuses on the analysis of SQLite or plist database files. It discusses in detail the special file artifacts that are a specialty of Apple devices. It teaches you how to work with Time Machine backups, or what you can get extra when a user uses Bootcamp. In addition to analyzing web browsers or photo metadata, the course will teach you how to work with Keychain, where passwords are stored, or Terminal commands that will come in handy during a forensic triage. We'll also discuss log files - Apple Unified Logs and Apple System Logs. The course also includes a description of how FSEvents or Spotlight search metadata works.<\/p>\n<p><strong>Length:<\/strong> 3 days<\/p>\n<p><strong>Suitable for: <\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites: <\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220; open=&#8220;off&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/shutterstock_1130017802-kopie-300x175.jpg\" width=\"300\" height=\"175\" alt=\"\" class=\"wp-image-1065 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>The primary focus of this course is macOS digital forensics, but due to the interconnected ecosystem, it will also touch on the iOS mobile operating system in many topics. In general, the course content focuses not only on operating system analysis, but also on securing data from the operating system or forensic triage. Thus, the course also serves for a general understanding of how Apple devices work.<\/p>\n<p>The course explains a number of basic digital forensics tasks for Apple devices, the operation of APFS and HFS+ file systems and their specifics. The course also focuses on the analysis of SQLite or plist database files. It discusses in detail the special file artifacts that are a specialty of Apple devices. It teaches you how to work with Time Machine backups, or what you can get extra when a user uses Bootcamp. In addition to analyzing web browsers or photo metadata, the course will teach you how to work with Keychain, where passwords are stored, or Terminal commands that will come in handy during a forensic triage. We'll also discuss log files - Apple Unified Logs and Apple System Logs. The course also includes a description of how FSEvents or Spotlight search metadata works.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong>\u00a03 days<\/p>\n<p><strong>Suitable for:\u00a0<\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites:\u00a0<\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Forenzn\u00ed anal\u00fdza mobiln\u00edch za\u0159\u00edzen\u00ed Android a iOS&#8220; open_toggle_text_color=&#8220;#000000&#8243; closed_toggle_text_color=&#8220;#000000&#8243; content_tablet=&#8220;<\/p>\n<p>Mobile devices such as mobile phones and tablets are nowadays the primary source of digital footprints. The vast majority of an individual's communications, location history, photos, scans, documents and other important information can be found in the memory of mobile devices.<\/p>\n<p>At the same time, mobile devices pose a challenge to digital forensics experts due to the low level of standardization. Whether it's overcoming device security or getting the most out of the stored data.<\/p>\n<p>This course focusing on digital forensics of mobile devices will guide you through the specifics of these devices, with particular emphasis on the most widely used Android and iOS operating systems. You will learn the principles of how these systems work, their file system structure <span> <\/span>with the limiting conditions for extracting data from these devices and the range of artefacts that can be extracted from the devices. We will review the most common tools and techniques used in mobile forensics. The possibilities and reasons for using root and jailbreak on individual devices will be mentioned, and you will also learn about JTAG and ISP methods for extracting device memory contents. The course will also focus on the use of mobile device backups and how they can be analyzed.<\/p>\n<p><strong>Length:<\/strong> 3 days<\/p>\n<p><strong>Suitable for: <\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites: <\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>Mobile devices such as mobile phones and tablets are nowadays the primary source of digital footprints. The vast majority of an individual's communications, location history, photos, scans, documents and other important information can be found in the memory of mobile devices.<\/p>\n<p>At the same time, mobile devices pose a challenge to digital forensics experts due to the low level of standardization. Whether it's overcoming device security or getting the most out of the stored data.<\/p>\n<p>This course focusing on digital forensics of mobile devices will guide you through the specifics of these devices, with particular emphasis on the most widely used Android and iOS operating systems. You will learn the principles of how these systems work, their file system structure <span> <\/span>with the limiting conditions for extracting data from these devices and the range of artefacts that can be extracted from the devices. We will review the most common tools and techniques used in mobile forensics. The possibilities and reasons for using root and jailbreak on individual devices will be mentioned, and you will also learn about JTAG and ISP methods for extracting device memory contents. The course will also focus on the use of mobile device backups and how they can be analyzed.<\/p>\n<p><strong>Length:<\/strong> 3 days<\/p>\n<p><strong>Suitable for: <\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites: <\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220; open=&#8220;off&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/shutterstock_1508063456-kopie-300x175.jpg\" width=\"300\" height=\"175\" alt=\"\" class=\"wp-image-1067 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>Mobile devices such as mobile phones and tablets are nowadays the primary source of digital footprints. The vast majority of an individual's communications, location history, photos, scans, documents and other important information can be found in the memory of mobile devices.<\/p>\n<p>At the same time, mobile devices pose a challenge to digital forensics experts due to the low level of standardization. Whether it's overcoming device security or getting the most out of the stored data.<\/p>\n<p>This course focusing on digital forensics of mobile devices will guide you through the specifics of these devices, with particular emphasis on the most widely used Android and iOS operating systems. You will learn the principles of how these systems work, their file system structure <span>\u00a0<\/span>with the limiting conditions for extracting data from these devices and the range of artefacts that can be extracted from the devices. We will review the most common tools and techniques used in mobile forensics. The possibilities and reasons for using root and jailbreak on individual devices will be mentioned, and you will also learn about JTAG and ISP methods for extracting device memory contents. The course will also focus on the use of mobile device backups and how they can be analyzed.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong>\u00a03 days<\/p>\n<p><strong>Suitable for:\u00a0<\/strong>forensic analysts, forensic experts, investigative teams<\/p>\n<p><strong>Prerequisites:\u00a0<\/strong>knowledge of the basics and principles of forensic analysis<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Produktov\u00e1 \u0161kolen\u00ed forenzn\u00edch n\u00e1stroj\u016f&#8220; open_toggle_text_color=&#8220;#000000&#8243; closed_toggle_text_color=&#8220;#000000&#8243; content_tablet=&#8220;<\/p>\n<p>Although a number of digital forensic analysis tasks can be performed manually with sufficient knowledge, these procedures are relatively difficult to use in practice, especially due to their time-consuming nature. A number of commercial and free forensic analysis tools are on the market to facilitate these activities. However, each tool has its own specificities and often differs significantly in its basic principle and logic of operation. That is why we have prepared specific training courses focused on the most commonly used digital forensic analysis tools.<\/p>\n<p>In all cases, common issues such as software installation and license management, case management, digital trace acquisition and processing, data viewing, filtering and analysis, or trace export and reporting are included in this course. These basic topics are always discussed with respect to the specific analytical tool and are complemented by an introduction to the specific functionalities of the selected tool.<\/p>\n<p><strong>BlackBag BlackLight<\/strong><\/p>\n<p><strong>BlackBag MacQuistion<\/strong><\/p>\n<p><strong>EnCase Forensic<\/strong><\/p>\n<p><strong>MobilEdit Forensic Express <\/strong><\/p>\n<p><strong>Autopsy<\/strong><\/p>\n<p><strong>Detego<\/strong><\/p>\n<p><strong>Recon Lab<\/strong><\/p>\n<p><strong><\/strong><\/p>\n<p><strong>Length:<\/strong> depends on the product<\/p>\n<p><strong>Suitable for: <\/strong>users of the forensic tools in question<\/p>\n<p><strong>Prerequisites: <\/strong>basic procedures and principles of digital forensic analysis<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>Although a number of digital forensic analysis tasks can be performed manually with sufficient knowledge, these procedures are relatively difficult to use in practice, especially due to their time-consuming nature. A number of commercial and free forensic analysis tools are on the market to facilitate these activities. However, each tool has its own specificities and often differs significantly in its basic principle and logic of operation. That is why we have prepared specific training courses focused on the most commonly used digital forensic analysis tools.<\/p>\n<p>In all cases, common issues such as software installation and license management, case management, digital trace acquisition and processing, data viewing, filtering and analysis, or trace export and reporting are included in this course. These basic topics are always discussed with respect to the specific analytical tool and are complemented by an introduction to the specific functionalities of the selected tool.<\/p>\n<\/p>\n<p><strong>BlackBag BlackLight<\/strong><\/p>\n<p><strong>BlackBag MacQuistion<\/strong><\/p>\n<p><strong>EnCase Forensic<\/strong><\/p>\n<p><strong>MobilEdit Forensic Express <\/strong><\/p>\n<p><strong>Autopsy<\/strong><\/p>\n<p><strong>Detego<\/strong><\/p>\n<p><strong>Recon Lab<\/strong><\/p>\n<p><strong><\/strong><\/p>\n<p><strong>Length:<\/strong> depends on the product<\/p>\n<p><strong>Suitable for: <\/strong>users of the forensic tools in question<\/p>\n<p><strong>Prerequisites: <\/strong>basic procedures and principles of digital forensic analysis<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220; open=&#8220;off&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/blackbag_logo_100x100_color.jpg\" width=\"100\" height=\"100\" alt=\"\" class=\"wp-image-470 alignnone size-full\" \/>\u00a0 \u00a0 \u00a0 \u00a0\u00a0<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/sumuri_logo_100x100_color.jpg\" width=\"100\" height=\"100\" alt=\"\" class=\"wp-image-465 alignnone size-full\" \/><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/mcms_logo_100x100_color.jpg\" width=\"100\" height=\"100\" alt=\"\" class=\"wp-image-468 alignnone size-full\" \/>\u00a0 \u00a0 \u00a0 <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/logo_compelson_100x100_color.jpg\" width=\"100\" height=\"100\" alt=\"\" class=\"wp-image-469 alignnone size-full\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>Although a number of digital forensic analysis tasks can be performed manually with sufficient knowledge, these procedures are relatively difficult to use in practice, especially due to their time-consuming nature. A number of commercial and free forensic analysis tools are on the market to facilitate these activities. However, each tool has its own specificities and often differs significantly in its basic principle and logic of operation. That is why we have prepared specific training courses focused on the most commonly used digital forensic analysis tools.<\/p>\n<p>In all cases, common issues such as software installation and license management, case management, digital trace acquisition and processing, data viewing, filtering and analysis, or trace export and reporting are included in this course. These basic topics are always discussed with respect to the specific analytical tool and are complemented by an introduction to the specific functionalities of the selected tool.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>BlackBag BlackLight<\/strong><\/p>\n<p><strong>BlackBag MacQuistion<\/strong><\/p>\n<p><strong>EnCase Forensic<\/strong><\/p>\n<p><strong>MobilEdit Forensic Express\u00a0<\/strong><\/p>\n<p><strong>Autopsy<\/strong><\/p>\n<p><strong>Detego<\/strong><\/p>\n<p><strong>Recon Lab\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong> depends on the product<\/p>\n<p><strong>Suitable for:\u00a0<\/strong>users of the forensic tools in question<\/p>\n<p><strong>Prerequisites:\u00a0<\/strong>basic procedures and principles of digital forensic analysis<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;#ff9500&#8243; height=&#8220;100px&#8220; custom_margin=&#8220;-30px||||false|false&#8220; animation_style=&#8220;fade&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;#ff9500&#8243; custom_margin=&#8220;-40px||||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;#ff9500&#8243; custom_margin=&#8220;0px||||false|false&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;-15px||||false|false&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; border_color_all=&#8220;#ff9500&#8243;]<\/p>\n<h2><strong><span style=\"color: #ffffff;\">Information Security Management Training<\/span><\/strong><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; min_height=&#8220;227px&#8220; custom_padding=&#8220;||||false|false&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;-50px||||false|false&#8220; animation_style=&#8220;fade&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_accordion open_toggle_background_color=&#8220;#ffffff&#8220; closed_toggle_background_color=&#8220;#ffffff&#8220; icon_color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.9.2&#8243; hover_enabled=&#8220;0&#8243; box_shadow_style=&#8220;preset2&#8243; text_orientation=&#8220;justified&#8220; sticky_enabled=&#8220;0&#8243;][et_pb_accordion_item title=&#8220;\u00davod do ISMS a ISO\/IEC 27 001&#8243; open=&#8220;on&#8220; open_toggle_text_color=&#8220;#000000&#8243; closed_toggle_text_color=&#8220;#000000&#8243; content_tablet=&#8220;<\/p>\n<p>A managerial and practical introduction to the Information Security Management System according to ISO\/IEC 27 001. The content of the course is designed to provide a basic overview of ISMS and the ISO\/IEC 27 000 family of standards to all those already working or planning to work in the field of cyber and information security. In particular, it is aimed at current or prospective CIOs and CSOs, internal auditors and IT professionals who wish to expand their portfolio into the Security field.<\/p>\n<p>During the training, you will learn the basic principles of ISO\/IEC 27 001 and how this group of standards relates to other management systems. You will learn about the importance of ISMS in an organization and the basic requirements for implementing this management system. You will learn how to work with basic concepts such as information assets, risk analysis and design of measures. We will explain the role of the different roles within the ISMS, the requirements for their performance and the actual scope of their activities.<\/p>\n<p>Completion of the course provides a sufficient basis for further specialization in the field of ISMS, e.g. for positions of internal or lead auditors. On the other hand, it provides managers with a basic understanding of ISMS implementation issues and ISO\/IEC 27 001 certification.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> management, candidates for CIO\/CISO positions, internal auditors<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>A managerial and practical introduction to the Information Security Management System according to ISO\/IEC 27 001. The content of the course is designed to provide a basic overview of ISMS and the ISO\/IEC 27 000 family of standards to all those already working or planning to work in the field of cyber and information security. In particular, it is aimed at current or prospective CIOs and CSOs, internal auditors and IT professionals who wish to expand their portfolio into the Security field.<\/p>\n<p>During the training, you will learn the basic principles of ISO\/IEC 27 001 and how this group of standards relates to other management systems. You will learn about the importance of ISMS in an organization and the basic requirements for implementing this management system. You will learn how to work with basic concepts such as information assets, risk analysis and design of measures. We will explain the role of the different roles within the ISMS, the requirements for their performance and the actual scope of their activities.<\/p>\n<p>Completion of the course provides a sufficient basis for further specialization in the field of ISMS, e.g. for positions of internal or lead auditors. On the other hand, it provides managers with a basic understanding of ISMS implementation issues and ISO\/IEC 27 001 certification.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> management, candidates for CIO\/CISO positions, internal auditors<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/03\/dreamstime_xxl_139990440-2-300x200.jpg\" width=\"300\" height=\"200\" alt=\"\" class=\"wp-image-308 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>A managerial and practical introduction to the Information Security Management System according to ISO\/IEC 27 001. The content of the course is designed to provide a basic overview of ISMS and the ISO\/IEC 27 000 family of standards to all those already working or planning to work in the field of cyber and information security. In particular, it is aimed at current or prospective CIOs and CSOs, internal auditors and IT professionals who wish to expand their portfolio into the Security field.<\/p>\n<p>During the training, you will learn the basic principles of ISO\/IEC 27 001 and how this group of standards relates to other management systems. You will learn about the importance of ISMS in an organization and the basic requirements for implementing this management system. You will learn how to work with basic concepts such as information assets, risk analysis and design of measures. We will explain the role of the different roles within the ISMS, the requirements for their performance and the actual scope of their activities.<\/p>\n<p>Completion of the course provides a sufficient basis for further specialization in the field of ISMS, e.g. for positions of internal or lead auditors. On the other hand, it provides managers with a basic understanding of ISMS implementation issues and ISO\/IEC 27 001 certification.<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> management, candidates for CIO\/CISO positions, internal auditors<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti&#8220; open_toggle_text_color=&#8220;#000000&#8243; closed_toggle_text_color=&#8220;#000000&#8243; content_tablet=&#8220;<\/p>\n<p>\u00davodn\u00ed kurz k z\u00e1konu \u010d. 181\/2014 Sb., o kybernetick\u00e9 bezpe\u010dnosti, je ur\u010den v\u0161em z\u00e1jemc\u016fm o praktickou aplikaci tohoto z\u00e1kona, v prvn\u00ed \u0159ad\u011b pak zam\u011bstnanc\u016fm organizac\u00ed, kter\u00e9 prov\u00e1d\u011bc\u00ed p\u0159edpisy k tomuto z\u00e1konu za\u0159adily pod jeho p\u016fsobnost. Sezn\u00e1m\u00edte se nejen s obsahem samotn\u00e9ho z\u00e1kona, ale rovn\u011b\u017e jeho prov\u00e1d\u011bc\u00edch p\u0159edpis\u016f, zejm\u00e9na pak s vyhl. 82\/2018, o kybernetick\u00e9 bezpe\u010dnosti, a o vazb\u011b t\u011bchto p\u0159edpis\u016f na syst\u00e9my ISMS dle ISO\/IEC 27 001. Obsahem kurzu je mimo jin\u00e9 i p\u0159edstaven\u00ed ze z\u00e1kona povinn\u00fdch rol\u00ed &#8211; mana\u017eera, architekta a auditora kybernetick\u00e9 bezpe\u010dnosti. Dozv\u00edte se, co to jsou informa\u010dn\u00ed aktiva a jak\u00e1 je role jejich garanta, jak\u00e9 jsou z\u00e1kladn\u00ed principy anal\u00fdzy rizik a pro\u010d se tato anal\u00fdza prov\u00e1d\u00ed a p\u0159edev\u0161\u00edm, jak\u00e9 re\u00e1ln\u00e9 p\u0159\u00ednosy pro organizaci lze opat\u0159en\u00edmi dle tohoto z\u00e1kona dos\u00e1hnout tak, aby ne\u0161lo jen o formalistick\u00e9 pln\u011bn\u00ed p\u0159edepsan\u00fdch povinnost\u00ed.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> IT professionals in public administration, management of KII organizations<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>\u00davodn\u00ed kurz k z\u00e1konu \u010d. 181\/2014 Sb., o kybernetick\u00e9 bezpe\u010dnosti, je ur\u010den v\u0161em z\u00e1jemc\u016fm o praktickou aplikaci tohoto z\u00e1kona, v prvn\u00ed \u0159ad\u011b pak zam\u011bstnanc\u016fm organizac\u00ed, kter\u00e9 prov\u00e1d\u011bc\u00ed p\u0159edpisy k tomuto z\u00e1konu za\u0159adily pod jeho p\u016fsobnost. Sezn\u00e1m\u00edte se nejen s obsahem samotn\u00e9ho z\u00e1kona, ale rovn\u011b\u017e jeho prov\u00e1d\u011bc\u00edch p\u0159edpis\u016f, zejm\u00e9na pak s vyhl. 82\/2018, o kybernetick\u00e9 bezpe\u010dnosti, a o vazb\u011b t\u011bchto p\u0159edpis\u016f na syst\u00e9my ISMS dle ISO\/IEC 27 001. Obsahem kurzu je mimo jin\u00e9 i p\u0159edstaven\u00ed ze z\u00e1kona povinn\u00fdch rol\u00ed &#8211; mana\u017eera, architekta a auditora kybernetick\u00e9 bezpe\u010dnosti. Dozv\u00edte se, co to jsou informa\u010dn\u00ed aktiva a jak\u00e1 je role jejich garanta, jak\u00e9 jsou z\u00e1kladn\u00ed principy anal\u00fdzy rizik a pro\u010d se tato anal\u00fdza prov\u00e1d\u00ed a p\u0159edev\u0161\u00edm, jak\u00e9 re\u00e1ln\u00e9 p\u0159\u00ednosy pro organizaci lze opat\u0159en\u00edmi dle tohoto z\u00e1kona dos\u00e1hnout tak, aby ne\u0161lo jen o formalistick\u00e9 pln\u011bn\u00ed p\u0159edepsan\u00fdch povinnost\u00ed.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> IT professionals in public administration, management of KII organizations<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220; open=&#8220;off&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/03\/dreamstime_xxl_96596646-300x200.jpg\" width=\"300\" height=\"200\" alt=\"\" class=\"wp-image-307 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>\u00davodn\u00ed kurz k z\u00e1konu \u010d. 181\/2014 Sb., o kybernetick\u00e9 bezpe\u010dnosti, je ur\u010den v\u0161em z\u00e1jemc\u016fm o praktickou aplikaci tohoto z\u00e1kona, v prvn\u00ed \u0159ad\u011b pak zam\u011bstnanc\u016fm organizac\u00ed, kter\u00e9 prov\u00e1d\u011bc\u00ed p\u0159edpisy k tomuto z\u00e1konu za\u0159adily pod jeho p\u016fsobnost. Sezn\u00e1m\u00edte se nejen s obsahem samotn\u00e9ho z\u00e1kona, ale rovn\u011b\u017e jeho prov\u00e1d\u011bc\u00edch p\u0159edpis\u016f, zejm\u00e9na pak s vyhl. 82\/2018, o kybernetick\u00e9 bezpe\u010dnosti, a o vazb\u011b t\u011bchto p\u0159edpis\u016f na syst\u00e9my ISMS dle ISO\/IEC 27 001. Obsahem kurzu je mimo jin\u00e9 i p\u0159edstaven\u00ed ze z\u00e1kona povinn\u00fdch rol\u00ed &#8211; mana\u017eera, architekta a auditora kybernetick\u00e9 bezpe\u010dnosti. Dozv\u00edte se, co to jsou informa\u010dn\u00ed aktiva a jak\u00e1 je role jejich garanta, jak\u00e9 jsou z\u00e1kladn\u00ed principy anal\u00fdzy rizik a pro\u010d se tato anal\u00fdza prov\u00e1d\u00ed a p\u0159edev\u0161\u00edm, jak\u00e9 re\u00e1ln\u00e9 p\u0159\u00ednosy pro organizaci lze opat\u0159en\u00edmi dle tohoto z\u00e1kona dos\u00e1hnout tak, aby ne\u0161lo jen o formalistick\u00e9 pln\u011bn\u00ed p\u0159edepsan\u00fdch povinnost\u00ed.<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> IT professionals in public administration, management of KII organizations<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Z\u00e1klady informa\u010dn\u00ed bezpe\u010dnosti pro zam\u011bstnance mimo IT&#8220; open_toggle_text_color=&#8220;#000000&#8243; closed_toggle_text_color=&#8220;#000000&#8243; content_tablet=&#8220;<\/p>\n<p>The biggest risk factor in cyber and information security is the human being. An organisation may have implemented a sophisticated information security management system supported by expensive SW and HW systems, but if it does not train its non-IT employees sufficiently, the effect of all these measures will be negligible and will not be commensurate with the cost of the measures.<\/p>\n<p>This short course is aimed at the non-IT employees of the organization and introduces them to the issue of information security in the performance of their work in a popular educational form with a number of practical examples. The participants will learn about the basic risks in the use of information technology resources and their possible impact on the operation of the organisation. We will introduce the basic rules of safe handling of information technology resources at the level of the devices themselves and commonly used applications. A special section is devoted to the use of mobile phones and tablets, as well as home office issues and BYOD policy.<\/p>\n<p>The course is always adapted to the environment of a specific organisation so that the examples used are relevant to the daily practical experience of the course participants.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> Anyone<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>The biggest risk factor in cyber and information security is the human being. An organisation may have implemented a sophisticated information security management system supported by expensive SW and HW systems, but if it does not train its non-IT employees sufficiently, the effect of all these measures will be negligible and will not be commensurate with the cost of the measures.<\/p>\n<p>This short course is aimed at the non-IT employees of the organization and introduces them to the issue of information security in the performance of their work in a popular educational form with a number of practical examples. The participants will learn about the basic risks in the use of information technology resources and their possible impact on the operation of the organisation. We will introduce the basic rules of safe handling of information technology resources at the level of the devices themselves and commonly used applications. A special section is devoted to the use of mobile phones and tablets, as well as home office issues and BYOD policy.<\/p>\n<p>The course is always adapted to the environment of a specific organisation so that the examples used are relevant to the daily practical experience of the course participants.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> Anyone<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220; open=&#8220;off&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/03\/dreamstime_xxl_92796845-300x200.jpg\" width=\"300\" height=\"200\" alt=\"\" class=\"wp-image-322 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>The biggest risk factor in cyber and information security is the human being. An organisation may have implemented a sophisticated information security management system supported by expensive SW and HW systems, but if it does not train its non-IT employees sufficiently, the effect of all these measures will be negligible and will not be commensurate with the cost of the measures.<\/p>\n<p>This short course is aimed at the non-IT employees of the organization and introduces them to the issue of information security in the performance of their work in a popular educational form with a number of practical examples. The participants will learn about the basic risks in the use of information technology resources and their possible impact on the operation of the organisation. We will introduce the basic rules of safe handling of information technology resources at the level of the devices themselves and commonly used applications. A special section is devoted to the use of mobile phones and tablets, as well as home office issues and BYOD policy.<\/p>\n<p>The course is always adapted to the environment of a specific organisation so that the examples used are relevant to the daily practical experience of the course participants.<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> Anyone<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8220;Ochrana citliv\u00fdch dat v pracovn\u00edm i osobn\u00edm \u017eivot\u011b&#8220; open_toggle_text_color=&#8220;#000000&#8243; closed_toggle_text_color=&#8220;#000000&#8243; title_last_edited=&#8220;off|desktop&#8220; content_tablet=&#8220;<\/p>\n<p>Tento kurz byl navr\u017een zejm\u00e9na s ohledem na pot\u0159eby svobodn\u00fdch povol\u00e1n\u00ed &#8211; advok\u00e1t\u016f, not\u00e1\u0159\u016f, l\u00e9ka\u0159\u016f, architekt\u016f, poradc\u016f, ale i dal\u0161\u00edch profesion\u00e1l\u016f nebo mal\u00fdch firem. Zkr\u00e1tka pro v\u0161echny, kte\u0159\u00ed denn\u011b pracuj\u00ed s citliv\u00fdmi informacemi, daty klient\u016f nebo cenn\u00fdm know-how a p\u0159itom za sebou nemaj\u00ed z\u00e1zem\u00ed velk\u00e9 spole\u010dnosti s vlastn\u00edm IT odd\u011blen\u00edm, a\u010dkoliv objem a hodnota jejich informa\u010dn\u00edch aktiv \u010dasto p\u0159esahuj\u00ed hodnoty vlastn\u011bn\u00e9 velk\u00fdmi spole\u010dnostmi.<\/p>\n<p>During the course, you will learn about information security in a popular and educational way and become more aware of the value of the information assets you manage and the risks of their unauthorized access or loss. You will learn to use basic procedures and methods to protect sensitive or valuable data. We'll explain how data is stored, what all data can be found on your devices, and how to delete data you no longer need irretrievably so it can't be misused in the future.<\/p>\n<p>All this without the requirement for advanced IT knowledge or a purchase of expensive special software.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> Anyone<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_phone=&#8220;<\/p>\n<p>Tento kurz byl navr\u017een zejm\u00e9na s ohledem na pot\u0159eby svobodn\u00fdch povol\u00e1n\u00ed &#8211; advok\u00e1t\u016f, not\u00e1\u0159\u016f, l\u00e9ka\u0159\u016f, architekt\u016f, poradc\u016f, ale i dal\u0161\u00edch profesion\u00e1l\u016f nebo mal\u00fdch firem. Zkr\u00e1tka pro v\u0161echny, kte\u0159\u00ed denn\u011b pracuj\u00ed s citliv\u00fdmi informacemi, daty klient\u016f nebo cenn\u00fdm know-how a p\u0159itom za sebou nemaj\u00ed z\u00e1zem\u00ed velk\u00e9 spole\u010dnosti s vlastn\u00edm IT odd\u011blen\u00edm, a\u010dkoliv objem a hodnota jejich informa\u010dn\u00edch aktiv \u010dasto p\u0159esahuj\u00ed hodnoty vlastn\u011bn\u00e9 velk\u00fdmi spole\u010dnostmi.<\/p>\n<p>During the course, you will learn about information security in a popular and educational way and become more aware of the value of the information assets you manage and the risks of their unauthorized access or loss. You will learn to use basic procedures and methods to protect sensitive or valuable data. We'll explain how data is stored, what all data can be found on your devices, and how to delete data you no longer need irretrievably so it can't be misused in the future.<\/p>\n<p>All this without the requirement for advanced IT knowledge or a purchase of expensive special software.<\/p>\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> Anyone<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&#8220; content_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.0.4&#8243; toggle_text_color=&#8220;#000000&#8243; toggle_font=&#8220;|600|||||||&#8220; closed_toggle_font=&#8220;|600|||||||&#8220; open=&#8220;off&#8220;]<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/03\/dreamstime_xxl_158418769-300x198.jpg\" width=\"300\" height=\"198\" alt=\"\" class=\"wp-image-310 alignnone size-medium\" \/><\/td>\n<td rowspan=\"2\" style=\"border: 1px solid white; vertical-align: top;\">\n<p>Tento kurz byl navr\u017een zejm\u00e9na s ohledem na pot\u0159eby svobodn\u00fdch povol\u00e1n\u00ed &#8211; advok\u00e1t\u016f, not\u00e1\u0159\u016f, l\u00e9ka\u0159\u016f, architekt\u016f, poradc\u016f, ale i dal\u0161\u00edch profesion\u00e1l\u016f nebo mal\u00fdch firem. Zkr\u00e1tka pro v\u0161echny, kte\u0159\u00ed denn\u011b pracuj\u00ed s citliv\u00fdmi informacemi, daty klient\u016f nebo cenn\u00fdm know-how a p\u0159itom za sebou nemaj\u00ed z\u00e1zem\u00ed velk\u00e9 spole\u010dnosti s vlastn\u00edm IT odd\u011blen\u00edm, a\u010dkoliv objem a hodnota jejich informa\u010dn\u00edch aktiv \u010dasto p\u0159esahuj\u00ed hodnoty vlastn\u011bn\u00e9 velk\u00fdmi spole\u010dnostmi.<\/p>\n<p>During the course, you will learn about information security in a popular and educational way and become more aware of the value of the information assets you manage and the risks of their unauthorized access or loss. You will learn to use basic procedures and methods to protect sensitive or valuable data. We'll explain how data is stored, what all data can be found on your devices, and how to delete data you no longer need irretrievably so it can't be misused in the future.<\/p>\n<p>All this without the requirement for advanced IT knowledge or a purchase of expensive special software.<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 300px; border: 1px solid white;\">\n<p><strong>Length:<\/strong> 1 day<\/p>\n<p><strong>Suitable for:<\/strong> Anyone<\/p>\n<p><strong>Prerequisites:<\/strong> None<\/p>\n<p>&nbsp;<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;rgba(0,0,0,0.07)&#8220; animation_style=&#8220;fade&#8220;][et_pb_row column_structure=&#8220;1_3,2_3&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;rgba(0,0,0,0)&#8220; custom_margin=&#8220;|auto|1px|auto|false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; locked=&#8220;off&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_image src=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/Titul.jpg&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.0.4&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;2_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.9.2&#8243; text_text_color=&#8220;#000000&#8243; text_font_size=&#8220;16px&#8220; header_2_font=&#8220;||||||||&#8220; header_2_text_color=&#8220;#000000&#8243; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;1.3em&#8220; custom_margin=&#8220;10px||||false|false&#8220; hover_enabled=&#8220;0&#8243; text_orientation=&#8220;justified&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<h2>Digital Forensic Review<\/h2>\n<p class=\"wnd-align-left\">Digital Forensic Review is a journal dedicated to digital forensics, the expert examination of digital data and information systems. It is intended for experts in the relevant fields, specialists of police forces, prosecutors, lawyers and courts who come into contact with criminal activities where digital devices or data are used as evidence or sources of information, as well as information security specialists, especially in the processes of investigating security incidents, and a wide range of other professionals in the field, as well as others interested in the issue of digital forensic analysis.<\/p>\n<p>It is published twice a year in a small print run primarily for public libraries and university and college libraries, or as needed for training and similar activities based on availability and on request.<\/p>\n<p>The journal is freely available as an electronic download in PDF format in <span style=\"text-decoration: underline;\"><span style=\"color: #ff9500;\"><a href=\"https:\/\/www.dfreview.cz\/archiv\/\" style=\"color: #ff9500; text-decoration: underline;\">an archive<\/a><\/span><\/span> on this website and for reading on the website <span style=\"text-decoration: underline;\"><span style=\"color: #ff9500;\"><a href=\"https:\/\/issuu.com\/digitalforensicreview\" target=\"_blank\" rel=\"noopener noreferrer\" style=\"color: #ff9500; text-decoration: underline;\">ISSUU<\/a><\/span><\/span>.<\/p>\n<p><span>The publisher is <\/span><a href=\"http:\/\/www.idfa.eu\/\"><span style=\"text-decoration: underline;\"><span style=\"color: #ff9500; text-decoration: underline;\">Institut pro digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzu, z.s<\/span><\/span>.\u00a0<\/a><span>The journal is peer-reviewed in the sections Methodology, Practice and Discussion.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; animation_style=&#8220;fade&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_image src=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/03\/ORG_DSC01157-2.jpg&#8220; _builder_version=&#8220;4.0.4&#8243; max_height=&#8220;460px&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_team_member name=&#8220;Dominik Nov\u00e1k&#8220; position=&#8220;Konzultant&#8220; _builder_version=&#8220;4.0.4&#8243; header_font=&#8220;|600|||||||&#8220; header_text_color=&#8220;#000000&#8243; header_font_size=&#8220;25px&#8220; position_text_color=&#8220;#000000&#8243; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;100px||0px||false|false&#8220;][\/et_pb_team_member][et_pb_text _builder_version=&#8220;4.0.4&#8243; header_2_font_size=&#8220;20px&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Interested in training?<\/h2>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8220;on&#8220; font_icon=&#8220;%%238%%&#8220; icon_color=&#8220;#ff9500&#8243; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.0.4&#8243; body_text_color=&#8220;#ff9500&#8243; body_font_size=&#8220;20px&#8220; body_link_text_color=&#8220;#ff9500&#8243; custom_margin=&#8220;|||0px|false|false&#8220;]<\/p>\n<p><a href=\"mailto:krasna@forensee.cz\">novak@forensee.cz<\/a>\u00a0<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8220;on&#8220; font_icon=&#8220;%%264%%&#8220; icon_color=&#8220;#ff9500&#8243; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.0.4&#8243; body_text_color=&#8220;#ff9500&#8243; body_font_size=&#8220;20px&#8220; body_link_text_color=&#8220;#ff9500&#8243; custom_margin=&#8220;|||0px|false|false&#8220;]<\/p>\n<p>+420 722 018 021<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0160kolen\u00ed \u00a0 \u00a0 \u0160kolen\u00ed v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy a informa\u010dn\u00ed bezpe\u010dnostiV rychle se vyv\u00edjej\u00edc\u00edm segmentu IT bezpe\u010dnosti je kontinu\u00e1ln\u00ed vzd\u011bl\u00e1v\u00e1n\u00ed kl\u00ed\u010dov\u00e9 Jen m\u00e1lo obor\u016f lidsk\u00e9 \u010dinnosti se vyv\u00edj\u00ed tak rychle, jako segment informa\u010dn\u00edch technologi\u00ed. A pokud hovo\u0159\u00edme o tom, \u017ee IT technologie se vyv\u00edjej\u00ed rychle, pak se obor bezpe\u010dnosti informa\u010dn\u00edch technologi\u00ed vyv\u00edj\u00ed p\u0159\u00edmo p\u0159ekotn\u011b. [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-263","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u0160kolen\u00ed - v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy - forensee<\/title>\n<meta name=\"description\" content=\"en m\u00e1lo obor\u016f lidsk\u00e9 \u010dinnosti se vyv\u00edj\u00ed tak rychle, jako segment informa\u010dn\u00edch technologi\u00ed. A pokud hovo\u0159\u00edme o tom, \u017ee IT technologie se...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forensee.cz\/en\/skoleni\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u0160kolen\u00ed - v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy - forensee\" \/>\n<meta property=\"og:description\" content=\"en m\u00e1lo obor\u016f lidsk\u00e9 \u010dinnosti se vyv\u00edj\u00ed tak rychle, jako segment informa\u010dn\u00edch technologi\u00ed. A pokud hovo\u0159\u00edme o tom, \u017ee IT technologie se...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forensee.cz\/en\/skoleni\/\" \/>\n<meta property=\"og:site_name\" content=\"forensee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/forensee\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-30T10:44:03+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/shutterstock_794397187-kopie-300x175.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@forensee\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"29 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forensee.cz\/skoleni\/\",\"url\":\"https:\/\/www.forensee.cz\/skoleni\/\",\"name\":\"\u0160kolen\u00ed - v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy - forensee\",\"isPartOf\":{\"@id\":\"https:\/\/www.forensee.cz\/#website\"},\"datePublished\":\"2020-02-21T17:24:40+00:00\",\"dateModified\":\"2021-03-30T10:44:03+00:00\",\"description\":\"en m\u00e1lo obor\u016f lidsk\u00e9 \u010dinnosti se vyv\u00edj\u00ed tak rychle, jako segment informa\u010dn\u00edch technologi\u00ed. A pokud hovo\u0159\u00edme o tom, \u017ee IT technologie se...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forensee.cz\/skoleni\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forensee.cz\/skoleni\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forensee.cz\/skoleni\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/www.forensee.cz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0160kolen\u00ed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forensee.cz\/#website\",\"url\":\"https:\/\/www.forensee.cz\/\",\"name\":\"forensee\",\"description\":\"\u0158e\u0161en\u00ed a slu\u017eby v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy a \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed\",\"publisher\":{\"@id\":\"https:\/\/www.forensee.cz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forensee.cz\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forensee.cz\/#organization\",\"name\":\"forensee\",\"url\":\"https:\/\/www.forensee.cz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png\",\"contentUrl\":\"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png\",\"width\":300,\"height\":75,\"caption\":\"forensee\"},\"image\":{\"@id\":\"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/forensee\",\"https:\/\/twitter.com\/forensee\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0160kolen\u00ed - v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy - forensee","description":"en m\u00e1lo obor\u016f lidsk\u00e9 \u010dinnosti se vyv\u00edj\u00ed tak rychle, jako segment informa\u010dn\u00edch technologi\u00ed. A pokud hovo\u0159\u00edme o tom, \u017ee IT technologie se...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forensee.cz\/en\/skoleni\/","og_locale":"en_US","og_type":"article","og_title":"\u0160kolen\u00ed - v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy - forensee","og_description":"en m\u00e1lo obor\u016f lidsk\u00e9 \u010dinnosti se vyv\u00edj\u00ed tak rychle, jako segment informa\u010dn\u00edch technologi\u00ed. A pokud hovo\u0159\u00edme o tom, \u017ee IT technologie se...","og_url":"https:\/\/www.forensee.cz\/en\/skoleni\/","og_site_name":"forensee","article_publisher":"https:\/\/www.facebook.com\/forensee","article_modified_time":"2021-03-30T10:44:03+00:00","og_image":[{"url":"http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/shutterstock_794397187-kopie-300x175.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@forensee","twitter_misc":{"Est. reading time":"29 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forensee.cz\/skoleni\/","url":"https:\/\/www.forensee.cz\/skoleni\/","name":"\u0160kolen\u00ed - v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy - forensee","isPartOf":{"@id":"https:\/\/www.forensee.cz\/#website"},"datePublished":"2020-02-21T17:24:40+00:00","dateModified":"2021-03-30T10:44:03+00:00","description":"en m\u00e1lo obor\u016f lidsk\u00e9 \u010dinnosti se vyv\u00edj\u00ed tak rychle, jako segment informa\u010dn\u00edch technologi\u00ed. A pokud hovo\u0159\u00edme o tom, \u017ee IT technologie se...","breadcrumb":{"@id":"https:\/\/www.forensee.cz\/skoleni\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forensee.cz\/skoleni\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forensee.cz\/skoleni\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/www.forensee.cz\/"},{"@type":"ListItem","position":2,"name":"\u0160kolen\u00ed"}]},{"@type":"WebSite","@id":"https:\/\/www.forensee.cz\/#website","url":"https:\/\/www.forensee.cz\/","name":"forensee","description":"\u0158e\u0161en\u00ed a slu\u017eby v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy a \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed","publisher":{"@id":"https:\/\/www.forensee.cz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forensee.cz\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forensee.cz\/#organization","name":"forensee","url":"https:\/\/www.forensee.cz\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/","url":"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png","contentUrl":"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png","width":300,"height":75,"caption":"forensee"},"image":{"@id":"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/forensee","https:\/\/twitter.com\/forensee"]}]}},"_links":{"self":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/comments?post=263"}],"version-history":[{"count":61,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/263\/revisions"}],"predecessor-version":[{"id":1793,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/263\/revisions\/1793"}],"wp:attachment":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/media?parent=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}