Cyber Forensics & Crime Investigation

by Innovians Technologies Claim Listing

This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific study, research and implementation of computer science subjects for the purpose of gathering digital evidence in cases of cyber crimes.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Innovians Technologies Logo

img Duration

Please Enquire

Course Details

This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific study, research and implementation of computer science subjects for the purpose of gathering digital evidence in cases of cyber crimes or for other scientific research purposes also it introduces the needs of the current cyber security sector.

 

Topics To Be Covered In CF&CI Workshop:

  • Day 1 (First Day)
  • 1.Understanding of an Organization’s IT Environment
  • Concept of Zoning – Demilitarized Zone, Militarized Zone
  • Basic Servers being used in the IT Environment and their positioning in different Zones
  • Brief Insight of the IT Security Devices used
  • 2.What is Computer Forensics all about?
  • Difference – Computer Crime & Un-authorized activities.
  • 6 steps involved in Computer Forensics – Description of what is to be carried in each step
  • Need for forensics investigator
  • 3.Security Incident Response
  • What is a Security Incident
  • Role of the Investigator in investigating a Security Incident
  • Evidence Control and Documentation
  • Skills and Training of a Forensics Investigator – Technical, Presentation, Professional
  • 4.Corporate Regulation and Privacy Issues
  • Computer Abuse in the Corporate World
  • Security Policies
  • Security and Acceptable-Use Policies
  • 5.Evidence Control and Documentation
  • Document, Documents, Document.
  • Evidence Collection and Inventory
  • Chain of Custody
  • Evidence Storage and Security
  • 6. Building a Forensics Laboratory
  • Laboratory Standards
  • Facility Physical Security
  • Evidence Security
  • Software
  • Hardware
  • Portable Forensics Labs
  • 7. COMMERCIAL FORENSICS SOFTWARE TOOLS
  • The Case for Commercial Tools
  • Encase
  • Access Data Forensics Tool Kit
  • DriveSpy and Paraben
  •  Day 2 (Second Day)
  • 8. Open Source FORENSICS TOOLS 
  • Windows Forensic Analysis Tools Open Source
  • Process Explorer from SysInternals
  • WhatsRunning
  • Registry Decoder CPORTS 
  • Windows File Analyzer
  • Windows File Checksum Integrity Verifier
  •  Registry Ripper
  •  Microsoft Log Parser Tool
  • 9. Open Source Disk Imaging Tools
  • What is Disk Imaging
  • Utilities of Disk Imaging Disk Imaging Utilities
  • Access Data FTK Imager
  • DixmlSetup
  • 10. File Analysis
  • What is File Analysis?
  • File Attributes
  • Unix File Permissions
  • Known File Type Signatures & Hashes
  • Malware Infected Files
  • Virus Characteristics
  • Indications of a Trojan Infection
  • Worms Windows File Analyzer- File Analysis Software
  • 11. Log analysis
  • Why Log Analysis
  • Windows Log analysis
  • Tools for Log Analysis
  • OSSEC HIDS
  • Installation Logs
  • Windows Event Logs
  • UNIX Syslogs
  • Firewall and IDS/IPS Logs
  • Apache Access Logs & Error Logs
  • 12. Windows Forensics
  • LIVE VS DEAD RESPONSES – WHEN AND WHY
  • NETWORK CONNECTIONS TCP-States
  • Demo-Whats Up Running Tool
  • Demo-Process Explorer Tool
  • Demo-CPorts
  • Windows Processes
  • Demo-Services.msc
  • Hidden Files
  • Concept of ADS (Alternate Data Stream)
  • Demo-Windows File Analyser Tool
  • AUDITING & THE SECURITY EVENT LOG
  • Demo- Windows File Checksum Integrity Verifier
  • Demo- Access Data Forensics Tool Kit
  • Create a Disk Image
  • 13. Linux Forensics
  • Network connections,
  • Services
  • Logging and log files in UNIX
  • Linux forensics tools
  • Demo - Real Time Command Logging
  • Forensic Analysis using OSSEC HIDS
  • 14. CONCLUDING THE INVESTIGATION
  • Documentation
  • Preparation
  • Concluding a Corporate Investigation
  • Testifying in Court
  • Ethical Responsibilities
  • Noida Branch

    C-56/11, 1st Basement, Noida

Check out more Computer Forensics courses in India

CyberSec Expert Logo

Certified Information Security Manager (CISM)

The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise’s information security.

by CyberSec Expert [Claim Listing ]
Indian Cyber Security Solutions Logo

Computer Forensic Training

Computer forensic training in Kolkata certification validates the  candidate’s skills to identify an intruder’s footprints and to properly  gather the necessary evidence to prosecute in a court of law. We are an  authorized training partner of the EC Council for the last 10 years.

by Indian Cyber Security Solutions [Claim Listing ]
  • Price
  • Start Date
  • Duration
Connecting Cyber Networks Logo

Check Point Certified Security Expert

CCSE course covers advanced configuration and management of Check Point security systems, VPN, Gateway Upgrades, Acceleration, clustering, troubleshooting, and security management tools for multiple sites, as well as network security concepts.

by Connecting Cyber Networks [Claim Listing ]
  • Price
  • Start Date
  • Duration
SaturnX Academy Logo

Digital Forensics Master

SaturnX Academy Digital Forensics Master is a professional who specializes in the field of digital forensics. Digital forensics involves the collection, analysis, and preservation of digital evidence to investigate and prevent cybercrimes and other digital-related incidents.

by SaturnX Academy [Claim Listing ]
Redback Academy Logo

CISO

A chief information security officer (CISO) is the senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.

by Redback Academy [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy