Select Page

CERTIFIED DIGITAL

FORENSICS EXPERT

 

 India’s current internet presence is at 34% i.e. nearly 500 million Indians have created their presence online. More than 1.7 million cyber crimes have been reported in india in last couple of years .In fact, India is the third most vulnerable country to cyber threats as per global crime report by CERT in 2020 . A forensics Examiners can detect the frauds and investigates the issues with his Digital forensics skills .

Computer forensics plays a prime role in the investigation of online frauds and cyber offenses. Many digital forensics training courses focus on the techniques and methods used in these fields, which often do not address the core principles: what digital forensics and incident response are and how to actually make use of digital investigations and digital evidence. This course provides that. It serves to educate the users and potential users of digital forensics and incident response teams, so that they better understand what these teams do and how their services can be better leveraged.

Certcube offers Digital forensics  expert training  , it includes the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. We have included almost every sub domain of digital forensics including Dead forensics , Live forensics , Network Forensics , Email Forensics , Browser forensics , Disk Forensics , Memory forensics and Mobile forensics . Cyber forensics has become its own area of scientific expertise,get a corporate oriented training  with accompanying coursework and certification.

 

REAL LIFE CASE STUDIES

INSTRUCTOR-LED SESSIONS

INDUSTRY DRIVEN CERTIFICATION

DAILY ASSIGNMENTS

STUDENT LEARNING KIT

 

syllabus

syllabus

MODULE 1 : DIGITAL FORENSICS
  • Branches of Digital Forensics
  • Cyber Laws and Case Studies
  • Cyber Laws & Standards
  • CERT, cyber cells in India
MODULE 2 : computer forensics lab setup
  • Setting up a forensic lab
  • Operations performed in the lab
  • Services provided in computer forensics
  • Elements of facilities
  • Necessary considerations
  • Essential forensic tools
MODULE 3 : criminal case approach
  • Where and when to do forensics
  • Accessing the case
  • Preservation of evidence
  • Collection of evidence
  • Examination of evidence
  • Analysis of evidence
  • Legal issues in forensics
MODULE 4 : FORENSICS Investigation PROCESS
  • Basic Forensic Process
  • Forensics 6A’s
  • Physical Protection of Evidence
  • Chain of custody
  • Forensic Investigator roles
  • Investigation Methods
  • Securing Evidence
  • Investigating company policy
  • Documentation and reporting

 

MODULE 5 : evidence Imaging essentials
  • Introduction to Imaging
  • Importance of Imaging
  • Hash algorithms
  • Integrity of the evidence
  • hard drive essentials 
  • FTK Imaging
  • Encase Imaging
  • Helix Imaging
  • Win hex Imaging
  • Disk Data Imaging
  • Autopsy Imaging
  • Write Blockers

 

MODULE 6 : Digital forensics analysis of evidence
  • Introduction to analysis
  • Configuring the tools
  • Analysis using FTK
  • Analysis using Encase
  • Analysis with Autopsy
  • Recovering files
  • Bookmarking evidence
  • Keyword searching
  • Password cracking
  • Email analysis
  • Web Activity Analysis
  • Reporting

 

MODULE 7 : Windows forensics
  • Windows Essentials and Acquisition
  • Windows Essentials and Acquisition
  • Disks and Partitions
  • File Systems & Events
  • Log Parsing and Analysis
  • Analysis Methods and Parsing Tools
  • Registry Essentials
  • Registry Forensics
  • Volatile data collection
  • Memory Acquisitions and Analysis
  • Hard Drive & SSD Forensics

 

MODULE 8 : Web criminal investigations
  • Introduction to analysis
  • Dos Attacks
  • SQL injection
  • Web defacement
  • Shell / backdoors
  • Challenges faced during investigation

 

MODULE 9 : Network forensics & log investigations
  • Ineternal Network & External Network Foreniscs
  • NIDS , HIDS , Monitoring Traffic Analysis
  • Gathering logs
  • Investigating logs
  • Investigating wireless access point
  • Auditing

 

MODULE 10 : memory analysis & forensics
  • Memory Essentials
  • Tools used for memory Acquire
  • Importance of Cache Data
  • Evidence Analysis in Memory
  • Mlware Analysis in Foreniscs

 

MODULE 11 : MAC & IOS forensics
  • Mac Essentials and Acquisition
  • IOS Essentials and Acquisition
  • Disks and Partitions
  • File System Events Store Database
  • Log Parsing and Analysis
  • Analysis Methods and Parsing Tools
  • IOS APP ANALYSIS
  • Live Response
  • Volatile data collection
  • Memory Acquisitions and Analysis
  • Volume and Disk Image Analysis

 

MODULE 12 : Corporate Investigations & Expert witness
  • Corporate Espionage
  • Trademark and Copyright
  • Child pornography
  • Sexual harassment
  • Source Code theft
  • Insurance industry fraud
  • Role of expert witness
  • Testifying as expert witness
  • Litigation support

 

MODULE 13 : FORENSICS REPORTING
  • Report Samples
  • Report writing skills
  • Common mistakes in report
  • Report submission
who should attend this training?
  • Freshers

  • Ethical hackers

  • System Administrators

  • Network Administrators

  • Forensics examiners

  • Forensics Analyst

  • Crime Expert

  • Security Professionals

why should i take this training?

The era of the technology is now growing every day but due to dependency on the technology cyber frauds and attacks are also increased so to take defense for yourself and your business this is the best suitable training to take entry in this domain.

prerequisite of the training ?

The person should familiar with basic computer operations 

what is the total duration of the training ?

Its an Instructor-led online training and the total duration of the training is 45 hours.

certified digital forensics

Expert Inquiry Form

3 + 4 =

Our clients

Testimonials

Today I’ve completed my one 2 one online training by Mr Naresh sir from Certcube Labs .
This is the first time I have attended a class in this format and wondered how effective it would be. It was very effective and therefore I would definitely be interested in attending other classes in the same format. The instructor was very knowlegeable and provided a wealth of information about the current version, especially since the last version I used was several releases ago.
Satyam Singh

BCA, Delhi University

A good place to learn every small detail in cybersecurity.Really nice and helpful teacher.

subhum

Btech, BITS Mesra

together Let’s Create the future

7 + 15 =