Training Type | Classroom & Online |
---|---|
Course Duration | 50 Days |
No. of Hours | Weekdays( Mon to Thu)- 2hrs/Day, Weekend (Sat & Sun)- 4hrs/Day, Only Sunday- 6hrs Per Day |
Certificate | Yes |
Skill Level | Intermediate |
Study Material | Yes |
Batches Available | (Mon-Thu) & (Sat-Sun) |
Roadmap
Roadmap
Course Outline
Forensic Investigator covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder's footprints and gathering necessary evidence for its prosecution. Al major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.
- To Understand Fundamentals of Computer Forensics
- To Understand different types of Cybercrime and the Process of Investigation
- What is Digital Evidence and eDiscovery?
- To Understand Forensic Readiness
- What is the Role of Various Processes and Technologies in Computer Forensics?
- To Understand Roles and Responsibilities of a Forensic Investigator.
- To Understand challenges faced by Investigator in cybercrimes.
- To Understand Standard and Best Practices related to Computer Forensics.
- To Know Laws and Legal Compliance in Computer Forensics.
- To Understand Forensic Investigation Process and its Importance
- What wil be the first response as a Cybercrime Investigator and Role of a first responder?
- To Understand Pre-Investigation phase.
- To Understand Investigation Phase.
- To Understand Post-Investigation Phase.
- What are differnet types of Disk Drives and their Characteristics?
- To Understand Logical Structure of a Disk.
- To Understand Booting Process of a different Operating System such as Windows, Linux and macOS.
- To Understand File System of a differnet operating system such as Windows, Linux and macOS.
- To Understand File System Analysis.
- To Understand Storage System.
- To Understand Encoding Standards and Hex Editors.
- To Analyze Populer File Formats like - Word File, Excel File, PowerPoint File, PDF File.
- To Understand Data Acquisition Process - Live Acquisition, Dead Acquisition.
- What is eDiscovery Collection, Methodologies and Tools?
- To Understand Data Acquisition Methodology-Acquire Volatile Data, Acquire Non-Volatile Data, Enable Write Protection on the evidence Media.
- To Understand Plan of Contingency, Validate Data Acquisition.
- How to Prepare an Image File for Examination?
- What are the Anti-Foresnsics Techniques and How Hackers use it?
- What are the Challenges to Forensics from Anti-Forensics Techniques?
- How data/file gets deleted and Recycle Bin Forensics?
- What is File Carving and their ways to Recover Evidence from Deleted Partitions?
- How to crack Password or Bypass user Password on Windows OS?
- What is Stegnography, Hidden Data in File System Structure, Trail Obfuscation?
- What are the Techniques of Artifact Wiping, Overwritten Data or Metadata Detection and their Encryption?
- What are Program Packers and Footprint Minimizing Techniques?
- What are the Different Windows Forensics Methodologies?
- How to Collect Windows Volatile Data and Non-volatile Data and Collect Windows Domain Information?
- How to do Windows Memory Analysis, Windows Registry Analysis, Electron Application Analysis?
- What is Web Browser Forensics and Carving SQLite Database Files?
- What is Windows File Analysis, Metadata Investigation, Windows ShellBags Analysis, LNK File Analysis?
- What is Jump List,Text-based Logs and Windows Event Logs?
- How to Collect Linux OS Volatile and Non-volatile Data?
- How to do Linux Memory Forensics?
- How to Collect Mac OS Volatile and Non-volatile Data?
- How to do Mac Memory Forensics?
- How to do Network Forensics with real time Analysis?
- What are the Different Types of Network-based Evidence, Types of Event Correlation and Event Correlation Approaches?
- How to Analyze Firewall logs, Analyze IDS logs, Analyze Honeypot Logs, Analyze Cisco Switch Logs,Analyze VPN Logs,Analyze DNS Server Logs?
- To Analyze Indicators of Compromise (IoCs) from different types of Logs.
- How to do Wireless Network Forensics and Detect and Investigate Wireless Network Attacks?
- What are the different ways for a Malware to enter into a system?
- What are the Different Components of Malware ?
- How to set up Malware Analysis Lab and to Analyze Suspicios Documents and Malware Artifacts?
- What are the Types of Malware Analysis-Static Analysis, System Behavior Analysis, Network Behavior Analysis and Ransomware Analysis?
- How to do Web Application Forensics?
- What are the Indicators of a Web Attack such as OWASP TOP 10?
- What will be the Web Attack Investigation Methodology for IIS server, Apache server?
- How to Analyze IIS Server Logs and Apache Server Logs?
- How to Detect and Investigate Various Attacks on Web Applications?
- What is Deep Web and Dark Web?
- What is TOR Browser and How to work with it?
- How to do Deep Web and Dark Web Forensics?
- How to Identify traces of TOR Browser during Investigation Process?
- What is Cloud Computing Services?
- What is OWASP TOP 10 Cloud Security Risks?
- What are the Fundamentals of AWS such as EC2 Instance, Data Storage, Logs?
- What are the Fundamentals of AZURE such as AZURE VM, Data Storage, Logs?
- What are the Fundamentals of GCP such as GCP VM, Data Storage, Logs?
- How to Investigate Persistent Disk Volume in GCP, Investigating Cloud Security Incidents, Cloud Container Security Incidents, Cloud VM Based Security Incidents?
- What are the Components Involved in Email Communication and Different parts of an Email?
- What are the Steps to Investigate Email Crimes?
- What are the U.S Government Lawa against Email Crime?
- What are the Different types of a Social Media Crime and How to Track User Activities and Investigate them?
- How to do Mobile Device Forensics?
- What are the OWASP TOP 10 Mobile RIsk?
- What is Android OS iOS Architecture and Boot Process?
- What is Forensics Process for Android and iOS?
- What is Android and iOS File System?
- How to Bypass Locked Android devices?
- How to Access Root Files of a Android Devices?
- How to Jailbreak iOS Devices?
- How to do Logical Acquisition and Physical Acquisition Mobile Devices?
- What is IoT Architecture and their Security Problem?
- What are the OWASP TOP 10 IoT Threats?
- What is IoT Forensics Process?
- How to do Wearable IoT Device, Smartwatch and IoT Device Forensics, Smart Speaker, Hardware Level Analysis?
Track | Classroom & Online |
---|---|
Duration | 50 Days |
Hours | Weekdays( Mon to Thu)- 2hrs/Day, Weekend (Sat & Sun)- 4hrs/Day, Only Sunday- 6hrs Per Day |