Cyber Awareness Free certificate  Free Certificate

Cyber Crime Investigation & Digital Forensics facebook

Cyber Crime Investigation & Digital Forensics (CCIDF)


 

Duration
2 MONTHS

Fee (INR)
₹ 28,000

Learn the skills to identify cybercrime and for Professionals who seek to work with network security, hacking issues and Cyber Fraud.


Benefits

Understand the process of investigating cyber-crimes and the laws involved, as well as details in obtaining a search warrant.
How to recover deleted files and deleted partitions
Learn Password cracking concepts, tools, types of password attacks and how to investigate password protected file breaches.
How to investigate logs, network traffic, wireless attacks, and web attacks
Understand Different types of digital evidence, rules of evidence, digital evidence examination processes, and electronic crime and digital evidence consideration by crime
Understand The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, as well as steganalysis, and image file forensics
Learn different types of log capturing techniques, log management, time synchronization and log capturing tools.
How to track e-mails and investigate e-mail crimes and many more.

Course Contents

    • ➥ What is Cyber Space?
    • ➥ What is Virtual World?
    • ➥ Career in Cyber Space
    • ➥ Job Opportunities in Hacking & Cyber Security
    • ➥ Roles & Responsibility of Cyber Expert
    • ➥ Job Areas & Designation
    • ➥ Foot-printing Concept
    • ➥ Benefits Of Foot-printing
    • ➥ Foot-printing Methodology
    • ➥ Foot-printing Through Search Engine
    • ➥ Foot-printing Using Advanced Google Hacking Techniques
    • ➥ GHDB Database
    • ➥ Search Diggity Tool
    • ➥ Foot-printing Through Social Networking Websites
    • ➥ Website Foot-printing
    • ➥ WHOIS Foot-printing
    • ➥ DNS Foot-printing
    • ➥ Recon-NG
    • ➥ Cyber Crime Introduction
    • ➥ Types of Cyber Crime
    • ➥ IT ACT 2008
    • ➥ Cyber Crime Cases
    • ➥ Cyber Law
    • ➥ What is Server Log?
    • ➥ Introduction of Nodal/Grievance officer
    • ➥ What is Email?
    • ➥ How Email Works?
    • ➥ Top 5 Email Services for Regular Users
    • ➥ Top 5 Email Services used by Corporates
    • ➥ What is Email Tracing & Tracking?
    • ➥ Find Root Of Email
    • ➥ What is Email Spoofing?
    • ➥ Email Spoofing Techniques
    • ➥ What is Encrypted Email Service?
    • ➥ Top 5 Encrypted Email Service
    • ➥ Data Recovery - The reality
    • ➥ What is Data Loss?
    • ➥ Your responsibility
    • ➥ Common Computer Problems
    • ➥ What Causes Data Loss?
    • ➥ How to Prevent Data Loss
    • ➥ Data Backup
    • ➥ Backup Hardware
    • ➥ After Backup
    • ➥ Data Recovery
    • ➥ Data Recovery Tips
    • ➥ Data Recovery Techniques
    • ➥ Data Recovery Software's
    • ➥ Use of machines to recover data
    • ➥ Scanning Probe Microscopy (SPM)
    • ➥ Magnetic Force Microscopy (MFM)
    • ➥ Scanning Tunnelling Microscopy (STM)
    • ➥ Data Destroy
    • ➥ Tools for Data Destroy
    • ➥ Cyber Fraud Detection
    • ➥ What is Social Media Fraud?
    • ➥ What is Fake Profile?
    • ➥ What is Imposter Profile?
    • ➥ Types of Social Media Frauds
    • ➥ Fake Facebook Profile Detection
    • ➥ Fake Instagram Profile Detection
    • ➥ Other Social Media Fake Profile Detection
    • ➥ Tracking & Tracing Process of Fake/Imposter Profile
    • ➥ Required Document from Victim of Social Media Fraud
    • ➥ Process of Deleting Fake/Imposter Profile
    • ➥ How to write a Report on Social Media Fraud?
    • ➥ How to complaint in Cyber Cell?
    • ➥ Report online for Cyber Crime?
    • ➥ Reporting For Private Investigation
    • ➥ Introduction to Financial Frauds
    • ➥ What is ATM cards?
    • ➥ Types of ATM Cards
    • ➥ What is Offline Banking?
    • ➥ What is Online Banking?
    • ➥ What is Virtual Wallet?
    • ➥ What is Virtual Card?
    • ➥ What is UPI?
    • ➥ What is Payment Gateways?
    • ➥ How to build own Payment Gateway?
    • ➥ How online Fraud done?
    • ➥ How to Investigate all types of Financial Fraud?
    • ➥ Required Document from Victim of Online Financial Fraud
    • ➥ How to Report in Bank?
    • ➥ How to complaint in Cyber Cell?
    • ➥ Report online for Cyber Crime?
    • ➥ Reporting For Private Investigation
    • ➥ What is Website?
    • ➥ Types of Website
    • ➥ What is Domain?
    • ➥ What is Web Hosting?
    • ➥ Types of Web Hosting Servers
    • ➥ Top 5 Web Hosting Providers
    • ➥ What is Database in Website?
    • ➥ What is front end & Back end?
    • ➥ How Database is connected to website?
    • ➥ What is SQL?
    • ➥ Command to manipulate database
    • ➥ What is Phishing?
    • ➥ How to create phishing page?
    • ➥ How to send and grab credentials using Phishing links?
    • ➥ What is Dos & DDoS attack?
    • ➥ Network and Website DoS attack methods
    • ➥ What is SQL Injection?
    • ➥ Types of SQL Injection
    • ➥ SQL Login bypass
    • ➥ Website data dump using SQL Map
    • ➥ Digital Forensic
    • ➥ What Is Forensic?
    • ➥ Why Does Forensic Require?
    • ➥ Computer Forensic
    • ➥ MD5, SHA1, SHA256 Hash Techniques
    • ➥ Image Cloning
    • ➥ Types of Cryptography/Steganography
    • ➥ Tools for Cryptography/Steganography
    • ➥ Nirlauncher Utilities
    • ➥ Network Forensic
    • ➥ Registry Forensic
    • ➥ Browser Forensic
    • ➥ ID Search : Data Indexing
    • ➥ What is Cellular Technology?
    • ➥ What is 2G,3G,4G & 5G Technology?
    • ➥ How Cell Tower works?
    • ➥ How Mobile Networks Works?
    • ➥ Devices on Cell Tower?
    • ➥ What is CDR?
    • ➥ Types of CDR
    • ➥ What is Cell ID?
    • ➥ What is MCC & MNC?
    • ➥ What is CGI?
    • ➥ Understanding CDR Files
    • ➥ Trace Spoof Mobile Call
    • ➥ Applications for Virtual Numbers
    • ➥ Mobile Number Hacking/Spoofing
    • ➥ Introduction to Malware
    • ➥ Malware Example
    • ➥ Malware Propagation
    • ➥ Trojan Concept
    • ➥ Use of Trojan by hacker
    • ➥ Infecting Systems through Trojan
    • ➥ Deploying Trojan
    • ➥ Virus And warm
    • ➥ Stage of Virus Life
    • ➥ Working With Viruses
    • ➥ Ransomware
    • ➥ Types Of Virus
    • ➥ Computer Warms
    • ➥ Malware Reverse Engineering
    • ➥ Malware analysis Procedure
    • ➥ Malware Detection
    • ➥ Detecting Trojans
    • ➥ Detecting Viruses
    • ➥ Introduction to Keyloggers/RATS
    • ➥ Types of Keyloggers/RATS
    • ➥ Incidence Management
    • ➥ Benefits of Incidence Management
    • ➥ The Incidence Management Process
    • ➥ Best Practice For Implementing Management
    • ➥ Importance Of Security Policy
    • ➥ Acceptable Encryption Policy
    • ➥ Acceptable Use Policy
    • ➥ Clean Desk Policy
    • ➥ Data Breach Response Policy
    • ➥ Disaster Recovery Plan Policy 58
    • ➥ Digital Signature Acceptance Policy
    • ➥ Email Policy
    • ➥ Ethics Policy
    • ➥ Pandemic Response Planning Policy
    • ➥ Password Construction Guideline
    • ➥ Password Protection Policy
    • ➥ Security Response Plan Policy
    • ➥ End Users Encryption Key protection Policy
    • ➥ Acquisition Assessment Policy
    • ➥ Bluetooth Baseline Requirements Policy
    • ➥ Remote Access Police
    • ➥ Remote Access Tools Policy
    • ➥ Router And Switch Security Policy
    • ➥ Wireless Communication Policy
    • ➥ Wireless Communication Standard
    • ➥ Database Credentials Policy
    • ➥ Technology Equipment Disposal Policy
    • ➥ Information Logging Standard
    • ➥ Lab Security Policy
    • ➥ Server Security Policy
    • ➥ Software Installation Policy
    • ➥ Workstation Security Policy
    • ➥ Application Security
    • ➥ Web Application Security Policy

Download Brochure

Eligibility

12th or Equivalent in any stream.

For Whom?

All IT professionals involved with information system security, computer forensics, and incident response.
Police Officers
LEA Employee
Anyone interested in learning about investigating cyber crimes
Head of Employees
Students

Career Opportunities

After completing their Cyber Crime Investigation and Digital Forensic course from the institute will be able build their career for the following areas:

IT Security Expert
Digital Forensics Analyst
Start your own Business with Minimum Investment
Cyber Security Consultant
IT - Forensics Analyst
Computer Forensics Investigator
Computer Forensics Technician
Information System Security Analyst

Student Kit

  Hard page Book
  Printable Digital Copy Material
  Laptop bag
  Necessary Tool (Academic Version)
  Course Certificate