Cyber Forensics & Crime Investigation

by Innovians Technologies Claim Listing

This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific study, research and implementation of computer science subjects for the purpose of gathering digital evidence in cases of cyber crimes.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Innovians Technologies Logo

img Duration

Please Enquire

Course Details

This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific study, research and implementation of computer science subjects for the purpose of gathering digital evidence in cases of cyber crimes or for other scientific research purposes also it introduces the needs of the current cyber security sector.

 

Topics To Be Covered In CF&CI Workshop:

  • Day 1 (First Day)
  • 1.Understanding of an Organization’s IT Environment
  • Concept of Zoning – Demilitarized Zone, Militarized Zone
  • Basic Servers being used in the IT Environment and their positioning in different Zones
  • Brief Insight of the IT Security Devices used
  • 2.What is Computer Forensics all about?
  • Difference – Computer Crime & Un-authorized activities.
  • 6 steps involved in Computer Forensics – Description of what is to be carried in each step
  • Need for forensics investigator
  • 3.Security Incident Response
  • What is a Security Incident
  • Role of the Investigator in investigating a Security Incident
  • Evidence Control and Documentation
  • Skills and Training of a Forensics Investigator – Technical, Presentation, Professional
  • 4.Corporate Regulation and Privacy Issues
  • Computer Abuse in the Corporate World
  • Security Policies
  • Security and Acceptable-Use Policies
  • 5.Evidence Control and Documentation
  • Document, Documents, Document.
  • Evidence Collection and Inventory
  • Chain of Custody
  • Evidence Storage and Security
  • 6. Building a Forensics Laboratory
  • Laboratory Standards
  • Facility Physical Security
  • Evidence Security
  • Software
  • Hardware
  • Portable Forensics Labs
  • 7. COMMERCIAL FORENSICS SOFTWARE TOOLS
  • The Case for Commercial Tools
  • Encase
  • Access Data Forensics Tool Kit
  • DriveSpy and Paraben
  •  Day 2 (Second Day)
  • 8. Open Source FORENSICS TOOLS 
  • Windows Forensic Analysis Tools Open Source
  • Process Explorer from SysInternals
  • WhatsRunning
  • Registry Decoder CPORTS 
  • Windows File Analyzer
  • Windows File Checksum Integrity Verifier
  •  Registry Ripper
  •  Microsoft Log Parser Tool
  • 9. Open Source Disk Imaging Tools
  • What is Disk Imaging
  • Utilities of Disk Imaging Disk Imaging Utilities
  • Access Data FTK Imager
  • DixmlSetup
  • 10. File Analysis
  • What is File Analysis?
  • File Attributes
  • Unix File Permissions
  • Known File Type Signatures & Hashes
  • Malware Infected Files
  • Virus Characteristics
  • Indications of a Trojan Infection
  • Worms Windows File Analyzer- File Analysis Software
  • 11. Log analysis
  • Why Log Analysis
  • Windows Log analysis
  • Tools for Log Analysis
  • OSSEC HIDS
  • Installation Logs
  • Windows Event Logs
  • UNIX Syslogs
  • Firewall and IDS/IPS Logs
  • Apache Access Logs & Error Logs
  • 12. Windows Forensics
  • LIVE VS DEAD RESPONSES – WHEN AND WHY
  • NETWORK CONNECTIONS TCP-States
  • Demo-Whats Up Running Tool
  • Demo-Process Explorer Tool
  • Demo-CPorts
  • Windows Processes
  • Demo-Services.msc
  • Hidden Files
  • Concept of ADS (Alternate Data Stream)
  • Demo-Windows File Analyser Tool
  • AUDITING & THE SECURITY EVENT LOG
  • Demo- Windows File Checksum Integrity Verifier
  • Demo- Access Data Forensics Tool Kit
  • Create a Disk Image
  • 13. Linux Forensics
  • Network connections,
  • Services
  • Logging and log files in UNIX
  • Linux forensics tools
  • Demo - Real Time Command Logging
  • Forensic Analysis using OSSEC HIDS
  • 14. CONCLUDING THE INVESTIGATION
  • Documentation
  • Preparation
  • Concluding a Corporate Investigation
  • Testifying in Court
  • Ethical Responsibilities
  • Noida Branch

    C-56/11, 1st Basement, Noida

Check out more Computer Forensics courses in India

Gologica Logo

Check Point Security Administration Training

The Check Point Security Administration course explains concepts and skills required to configure the Check Point Security Gateway, learn about managing secure networks, and configure security policies. 

by Gologica [Claim Listing ]
CDI (Cyber Defence Intelligence) Logo

Cyber Security Course

Cyber Security Course in agra- Cyber Security is the art of identifying and securing potential threats to digital assets like websites, server, networks, operating system and more of an organization.

by CDI (Cyber Defence Intelligence) [Claim Listing ]
IICNS (Indian Institute of Code Network and Security) Logo

Cyber Security, Ethical Hacking & Penetration Testing Certification Course

This intensive 6-month program equips you with the skills to become a proficient ethical hacker and penetration tester. Delivered over a 12-week period (2 hours daily, 5 days per week), the course offers a comprehensive blend of theory, hands-on labs, and real-world scenario exercises.

by IICNS (Indian Institute of Code Network and Security) [Claim Listing ]
MIS Infotech Logo

Cyber Security

Cyber security deals with the protection of hardware, software and the network of an organization from natural disasters and external attacks (SQL injection, XSS, DOS, etc). It is basically concerned about electronic data and must be covered in the IT Policy of an organization.

by MIS Infotech [Claim Listing ]
Dcodetech Industrial Training Logo

Government Certificate Course In Cyber Security And Ethical Hacking

Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker" was originated.

by Dcodetech Industrial Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy