Digital Forensics

by Encarta Labs Pvt Ltd Claim Listing

The Digital Forensics training course provides a strong foundational introduction to Digital Forensics on Microsoft Windows-based systems. You work in both a Windows and Linux environment for your investigative workstations and are exposed to theory and practical skills.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Encarta Labs Pvt Ltd Logo

img Duration

5 Days

Course Details

The Digital Forensics training course provides a strong foundational introduction to Digital Forensics on Microsoft Windows-based systems. You work in both a Windows and Linux environment for your investigative workstations and are exposed to theory and practical skills for an entry-level forensic examiner (acquisition, analysis and reporting), with exposure to advanced topics (live system and mobile forensics).

 

Objectives:

  • Perform the essential duties of a Forensic Examiner
  • Prepare for and execute digital forensic investigations on Windows-based systems
  • Apply forensic methodologies to preserve, acquire, extract and analyze information of investigative importance
  • Identify and analyze key Windows artifacts of investigative importance

 

Course Agenda:

  • Defining digital forensics
  • Articulating the importance of Locard's Principle
  • Contextualizing digital forensics within incident response
  • Explaining the role of digital forensics in investigations
  • Criminal, civil and intelligence/anti-terrorism investigations
  • Applying the scientific method to investigations
  • Articulating the role of a digital forensic examiner
  • Maintaining objectivity within investigations
  • Ensuring confidentiality and integrity
  • Exploring legal considerations of digital forensics
  • Respecting privacy rights and expectations
  • Addressing and reporting illegal information
  • Defining and applying privacy principles
  • Outlining the twelve privacy principles
  • Addressing the duty to preserve in eDiscovery
  • Examining the core operational principles of a computer
  • Inspecting hard drive storage and architecture
  • Reviewing the operations of computer memory
  • Identifying multiple locations of digital evidence within a computer system
  • Investigating alternate data streams
  • Uncovering hidden data with Steganography
  • Determining lab requirements
  • Key components of a digital forensics lab
  • Conducting tool validation
  • Preparing and configuring a forensic workstation
  • Demonstrating appropriate use of a hardware write-blocker
  • Exploring key features of commercial and open source forensic software (e.g., EnCase, FTK, DD)
  • Image acquisition
  • Creating bit-for-bit copies of digital evidence
  • Mounting and searching images
  • Documenting the physical and digital crime scene
  • Conducting crime scene photography
  • Executing triage techniques and methodologies
  • Managing the chain of custody
  • Bagging and tagging physical evidence
  • Documenting and demonstrating evidence continuity
  • Identifying key Windows artifacts
  • Recovering and searching the Windows registry
  • Hibernation files, event logs, prefetch, shellbag and lnk files
  • Password hash extraction and cracking
  • Performing keyword searching, bookmarking and timeline analysis
  • Developing strategies for effective keyword searching
  • Reconstructing the order of events with timeline analysis
  • Conducting e-mail, web browser and USB investigations
  • Extracting and recovering deleted data from slack space
  • Tracking user activity and addressing Trojan Defense
  • Performing Mobile Forensics
  • Safely handling mobile devices during investigations
  • Examining the use of Faraday bags
  • Demonstrating the use of mobile cables and write-blockers
  • Preserving and acquiring evidence from mobile devices
  • Investigating evidence located within the address book, calendar, mail, apps and SMS
  • Recovering data from SIM cards
  • Performing live memory acquisitions
  • Bangalore Branch

    19th Main Road BTM Layout, 6th Stage, Arekere, Bangalore

Check out more Computer Forensics courses in India

Hectranet Logo

Checkpoint Firewall CCSE

CCSE certification provides an understanding of basic concepts and skills necessary to configure Check Point Firewall. CCSA certification validates a Security Administrator’s ability to maintain day-to-day operation of Check Point security solutions.

by Hectranet [Claim Listing ]
Mildain Solutions Logo

CCSP Certification Training

In today’s era, unique security threats are significantly increasing which may hamper your sensitive data as well as your system. To deal with these security challenges, learn CCSP: the leading online Cloud Security Training and Certification course by ISC 2 Enroll & Get Certified now!

by Mildain Solutions [Claim Listing ]
  • Price
  • Start Date
  • Duration
DIIT Educom Logo

CHFI

CHFI course is offered by DIIT Educom. DIIT Educom has been providing a learning platform through job-oriented IT courses, thereby bridging the skill-gap. DIIT has been dedicated to making candidates skilled and employable based on changing industry requirements.

by DIIT Educom [Claim Listing ]
Bluemorpho Learning Solutions Logo

Computer Hacking Forensic Investigator

The CHFI (Certified Hacking Forensic Investigator) Certification offered by the EC-Council, is your ticket to becoming a skilled professional in the realm of digital forensics and cybersecurity.

by Bluemorpho Learning Solutions [Claim Listing ]
NIIT Logo

Cybersecurity Program

The program equips you with requisite skills to become a confident job-ready cyber security professional who can contribute to varieties of activities within the cyber security practice.

by NIIT [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy