Digital Forensics

by Encarta Labs Pvt Ltd Claim Listing

The Digital Forensics training course provides a strong foundational introduction to Digital Forensics on Microsoft Windows-based systems. You work in both a Windows and Linux environment for your investigative workstations and are exposed to theory and practical skills.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Encarta Labs Pvt Ltd Logo

img Duration

5 Days

Course Details

The Digital Forensics training course provides a strong foundational introduction to Digital Forensics on Microsoft Windows-based systems. You work in both a Windows and Linux environment for your investigative workstations and are exposed to theory and practical skills for an entry-level forensic examiner (acquisition, analysis and reporting), with exposure to advanced topics (live system and mobile forensics).

 

Objectives:

  • Perform the essential duties of a Forensic Examiner
  • Prepare for and execute digital forensic investigations on Windows-based systems
  • Apply forensic methodologies to preserve, acquire, extract and analyze information of investigative importance
  • Identify and analyze key Windows artifacts of investigative importance

 

Course Agenda:

  • Defining digital forensics
  • Articulating the importance of Locard's Principle
  • Contextualizing digital forensics within incident response
  • Explaining the role of digital forensics in investigations
  • Criminal, civil and intelligence/anti-terrorism investigations
  • Applying the scientific method to investigations
  • Articulating the role of a digital forensic examiner
  • Maintaining objectivity within investigations
  • Ensuring confidentiality and integrity
  • Exploring legal considerations of digital forensics
  • Respecting privacy rights and expectations
  • Addressing and reporting illegal information
  • Defining and applying privacy principles
  • Outlining the twelve privacy principles
  • Addressing the duty to preserve in eDiscovery
  • Examining the core operational principles of a computer
  • Inspecting hard drive storage and architecture
  • Reviewing the operations of computer memory
  • Identifying multiple locations of digital evidence within a computer system
  • Investigating alternate data streams
  • Uncovering hidden data with Steganography
  • Determining lab requirements
  • Key components of a digital forensics lab
  • Conducting tool validation
  • Preparing and configuring a forensic workstation
  • Demonstrating appropriate use of a hardware write-blocker
  • Exploring key features of commercial and open source forensic software (e.g., EnCase, FTK, DD)
  • Image acquisition
  • Creating bit-for-bit copies of digital evidence
  • Mounting and searching images
  • Documenting the physical and digital crime scene
  • Conducting crime scene photography
  • Executing triage techniques and methodologies
  • Managing the chain of custody
  • Bagging and tagging physical evidence
  • Documenting and demonstrating evidence continuity
  • Identifying key Windows artifacts
  • Recovering and searching the Windows registry
  • Hibernation files, event logs, prefetch, shellbag and lnk files
  • Password hash extraction and cracking
  • Performing keyword searching, bookmarking and timeline analysis
  • Developing strategies for effective keyword searching
  • Reconstructing the order of events with timeline analysis
  • Conducting e-mail, web browser and USB investigations
  • Extracting and recovering deleted data from slack space
  • Tracking user activity and addressing Trojan Defense
  • Performing Mobile Forensics
  • Safely handling mobile devices during investigations
  • Examining the use of Faraday bags
  • Demonstrating the use of mobile cables and write-blockers
  • Preserving and acquiring evidence from mobile devices
  • Investigating evidence located within the address book, calendar, mail, apps and SMS
  • Recovering data from SIM cards
  • Performing live memory acquisitions
  • Bangalore Branch

    19th Main Road BTM Layout, 6th Stage, Arekere, Bangalore

Check out more Computer Forensics courses in India

CSDT Centre Logo

Cyber Security Training

CSDT Centre Patna is leading cyber security Training Center or Institute in Patna, Bihar, India. Cyber Security Course in Patna is curated to help you command security conventions in information processing systems.

by CSDT Centre [Claim Listing ]
Axximum Infosolutions Logo

Certified Chief Information Security Officer Certification

The Certified Chief Information Security Officer – Certification program, offered by Axximum Infosolutions, is a unique training and certification path designed for aspiring and current Chief Information Security Officers (C|CISOs).

by Axximum Infosolutions [Claim Listing ]
WebAsha Technologies Logo

CISM Training

CISM, which stands for Certified Information Security Manager, is a professional certification offered by ISACA (Information Systems Audit and Control Association).

by WebAsha Technologies [Claim Listing ]
NDTCTC Logo

Cyber Security

Cyber Security course is offered by NDTCTC. NDT CTC is a leading training provider offering cost-effective, quality and real-time training courses in this booming analytics field.

by NDTCTC [Claim Listing ]
MTA India Logo

Cyber Security Training

Cyber Security course is offered by MTA India for all skill level. MTA India has one clear vision. To provide quality IT Training that can be used in making a successful IT career.

by MTA India [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy