Expert Advice Logo  Expert Advice

Cyber Crime Investigation & Digital Forensics facebook

Cyber Crime Investigation & Digital Forensics (CCIDF)


 

Duration
2 MONTHS

Fee (INR)
₹ 22,500

Learn the skills to identify cybercrime and for Professionals who seek to work with network security, hacking issues and Cyber Fraud.


Benefits

Understand the process of investigating cyber-crimes and the laws involved, as well as details in obtaining a search warrant.
How to recover deleted files and deleted partitions
Learn Password cracking concepts, tools, types of password attacks and how to investigate password protected file breaches.
How to investigate logs, network traffic, wireless attacks, and web attacks
Understand Different types of digital evidence, rules of evidence, digital evidence examination processes, and electronic crime and digital evidence consideration by crime
Understand The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, as well as steganalysis, and image file forensics
Learn different types of log capturing techniques, log management, time synchronization and log capturing tools.
How to track e-mails and investigate e-mail crimes and many more.

Course Contents

    • ➥ Cyber Crime Introduction
    • ➥ Types Of Cyber Crime
    • ➥ Cyber Law
    • ➥ Introduction to Server Log
    • ➥ Email Tracing And Tracking
    • ➥ Root of Email
    • ➥ Email Spoofing
    • ➥ Proton Mail : Encrypted Email Service
    • ➥ Morphing Detection
    • ➥ Data Recovery
    • ➥ Data Destroy
    • ➥ Cyber Fraud Detection
    • ➥ Fake Facebook Profile Detection
    • ➥ Fake Instagram Profile Detection
    • ➥ ATM Card Fraud Investigation
    • ➥ Virtual Wallet & Security
    • ➥ Virtual Card & Security
    • ➥ Basics Of Website Hacking
    • ➥ DoS/DDoS Attack Tool
    • ➥ Website Phishing
    • ➥ Digital Forensic
    • ➥ What Is Forensic?
    • ➥ Why Does Forensic Require?
    • ➥ Live System Footprinting : WinLift
    • ➥ MD5, SHA1, SHA256 Hash Techniques
    • ➥ Image Cloning
    • ➥ Types of Cryptography/Steganography
    • ➥ Tools for Cryptography/Steganography
    • ➥ Nirlauncher Utilities
    • ➥ Network Forensic
    • ➥ Registry Forensic
    • ➥ Browser Forensic
    • ➥ ID Search : Data Indexing
    • ➥ Trace Spoof Mobile Call
    • ➥ Cell Towers and Mobile Networks
    • ➥ Mobile Number Hacking
    • ➥ Introduction to Malware
    • ➥ Malware Example
    • ➥ Malware Propagation
    • ➥ Trojan Concept
    • ➥ Use of Trojan by hacker
    • ➥ Infecting Systems through Trojan
    • ➥ Deploying Trojan
    • ➥ Virus And warm
    • ➥ Stage of Virus Life
    • ➥ Working With Viruses
    • ➥ Ransomware
    • ➥ Types Of Virus
    • ➥ Computer Warms
    • ➥ Malware Reverse Engineering
    • ➥ Malware analysis Procedure
    • ➥ Malware Detection
    • ➥ Detecting Trojans
    • ➥ Detecting Viruses
    • ➥ Introduction to Keyloggers/RATS
    • ➥ Types of Keyloggers/RATS
    • ➥ Incidence Management
    • ➥ Benefits of Incidence Management
    • ➥ The Incidence Management Process
    • ➥ Best Practice For Implementing Management
    • ➥ Importance Of Security Policy
    • ➥ Acceptable Encryption Policy
    • ➥ Acceptable Use Policy
    • ➥ Clean Desk Policy
    • ➥ Data Breach Response Policy
    • ➥ Disaster Recovery Plan Policy 58
    • ➥ Digital Signature Acceptance Policy
    • ➥ Email Policy
    • ➥ Ethics Policy
    • ➥ Pandemic Response Planning Policy
    • ➥ Password Construction Guideline
    • ➥ Password Protection Policy
    • ➥ Security Response Plan Policy
    • ➥ End Users Encryption Key protection Policy
    • ➥ Acquisition Assessment Policy
    • ➥ Bluetooth Baseline Requirements Policy
    • ➥ Remote Access Police
    • ➥ Remote Access Tools Policy
    • ➥ Router And Switch Security Policy
    • ➥ Wireless Communication Policy
    • ➥ Wireless Communication Standard
    • ➥ Database Credentials Policy
    • ➥ Technology Equipment Disposal Policy
    • ➥ Information Logging Standard
    • ➥ Lab Security Policy
    • ➥ Server Security Policy
    • ➥ Software Installation Policy
    • ➥ Workstation Security Policy
    • ➥ Application Security
    • ➥ Web Application Security Policy


Eligibility

12th or Equivalent in any stream.

For Whom?

All IT professionals involved with information system security, computer forensics, and incident response.
Police Officers
LEA Employee
Anyone interested in learning about investigating cyber crimes
Head of Employees
Students

Career Opportunities

After completing their Cyber Crime Investigation and Digital Forensic course from the institute will be able build their career for the following areas:

IT Security Expert
Digital Forensics Analyst
Start your own Business with Minimum Investment
Cyber Security Consultant
IT - Forensics Analyst
Computer Forensics Investigator
Computer Forensics Technician
Information System Security Analyst

Student Kit

  Hard page Book
  Printable Digital Copy Material
  Laptop bag
  Necessary Tool (Academic Version)
  Course Certificate