CERTIFIED DIGITAL FORENSICS EXPERT

 

 India’s current internet penetration is at 34% i.e. nearly 500 million Indians have created their presence online. 

more than 1.7 lakhs cybercrimes have been reported in India in the last couple of years.

In fact, India is the third most vulnerable country to cyber threats as per a survey by Cyber Security Company, Symantec. A forensics Examiners can detect the frauds and investigates the issues with his Digital forensics skills .

Computer forensics plays a prime role in the investigation of online frauds and cyber offenses.Certcube offers  Cyber forensics training ,includes the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Cyber forensics has become its own area of scientific expertise, with accompanying coursework and certification

 

REAL LIFE CASE STUDIES

INSTRUCTOR-LED SESSIONS

INDUSTRY DRIVEN CERTIFICATION

DAILY ASSIGNMENTS

STUDENT LEARNING KIT

 

syllabus

syllabus

MODULE 1 : DIGITAL FORENSICS
  • Branches of Digital Forensics
  • Cyber Laws and Case Studies
  • Cyber Laws & Standards
  • CERT, cyber cells in India
MODULE 2 : computer forensics lab setup
  • Setting up a forensic lab
  • Operations performed in the lab
  • Services provided in computer forensics
  • Elements of facilities
  • Necessary considerations
  • Essential forensic tools
MODULE 3 : criminal case approach
  • Where and when to do forensics
  • Accessing the case
  • Preservation of evidence
  • Collection of evidence
  • Examination of evidence
  • Analysis of evidence
  • Legal issues in forensics
MODULE 4 : FORENSICS Investigation PROCESS
  • Basic Forensic Process
  • Forensics 6A’s
  • Physical Protection of Evidence
  • Chain of custody
  • Forensic Investigator roles
  • Investigation Methods
  • Securing Evidence
  • Investigating company policy
  • Documentation and reporting

 

MODULE 5 : evidence Imaging essentials
  • Introduction to Imaging
  • Importance of Imaging
  • Hash algorithms
  • Integrity of the evidence
  • hard drive essentials 
  • FTK Imaging
  • Encase Imaging
  • Helix Imaging
  • Win hex Imaging
  • Disk Data Imaging
  • Autopsy Imaging
  • Write Blockers

 

MODULE 6 : Digital forensics analysis of evidence
  • Introduction to analysis
  • Configuring the tools
  • Analysis using FTK
  • Analysis using Encase
  • Analysis with Autopsy
  • Recovering files
  • Bookmarking evidence
  • Keyword searching
  • Password cracking
  • Email analysis
  • Web Activity Analysis
  • Reporting

 

MODULE 7 : Windows forensics
  • Windows Essentials and Acquisition
  • Windows Essentials and Acquisition
  • Disks and Partitions
  • File Systems & Events
  • Log Parsing and Analysis
  • Analysis Methods and Parsing Tools
  • Registry Essentials
  • Registry Forensics
  • Volatile data collection
  • Memory Acquisitions and Analysis
  • Hard Drive & SSD Forensics

 

MODULE 8 : Web criminal investigations
  • Introduction to analysis
  • Dos Attacks
  • SQL injection
  • Web defacement
  • Shell / backdoors
  • Challenges faced during investigation

 

MODULE 9 : Network forensics & log investigations
  • Ineternal Network & External Network Foreniscs
  • NIDS , HIDS , Monitoring Traffic Analysis
  • Gathering logs
  • Investigating logs
  • Investigating wireless access point
  • Auditing

 

MODULE 10 : memory analysis & forensics
  • Memory Essentials
  • Tools used for memory Acquire
  • Importance of Cache Data
  • Evidence Analysis in Memory
  • Mlware Analysis in Foreniscs

 

MODULE 11 : MAC & IOS forensics
  • Mac Essentials and Acquisition
  • IOS Essentials and Acquisition
  • Disks and Partitions
  • File System Events Store Database
  • Log Parsing and Analysis
  • Analysis Methods and Parsing Tools
  • IOS APP ANALYSIS
  • Live Response
  • Volatile data collection
  • Memory Acquisitions and Analysis
  • Volume and Disk Image Analysis

 

MODULE 12 : Corporate Investigations & Expert witness
  • Corporate Espionage
  • Trademark and Copyright
  • Child pornography
  • Sexual harassment
  • Source Code theft
  • Insurance industry fraud
  • Role of expert witness
  • Testifying as expert witness
  • Litigation support

 

MODULE 13 : FORENSICS REPORTING
  • Report Samples
  • Report writing skills
  • Common mistakes in report
  • Report submission
who should attend this training?
  • Freshers

  • Ethical hackers

  • System Administrators

  • Network Administrators

  • Forensics examiners

  • Forensics Analyst

  • Crime Expert

  • Security Professionals

why should i take this training?

The era of the technology is now growing every day but due to dependency on the technology cyber frauds and attacks are also increased so to take defense for yourself and your business this is best suitable training to take entry in this domain.

pri-requisite of the training ?

The person should familiar with basic computer operations 

digital forensics Expert Inquiry 

4 + 2 =

Our clients

Testimonials

Today I’ve completed my one 2 one online training by Mr Naresh sir from Certcube Labs .
This is the first time I have attended a class in this format and wondered how effective it would be. It was very effective and therefore I would definitely be interested in attending other classes in the same format. The instructor was very knowlegeable and provided a wealth of information about the current version, especially since the last version I used was several releases ago.
Satyam Singh

BCA, Delhi University

A good place to learn every small detail in cybersecurity.Really nice and helpful teacher.

subhum

Btech, BITS Mesra

together Let’s Create the future

2 + 13 =