Event Details
Computer Forensics Techniques and Tools workshop offers to participants the skills and knowledge to identify an intruder's footprints and to properly gather the necessary evidence to prosecute in the court of law. It covers investigating intrusion on computers/ computing devices, applications, websites and networks.
CONTENT
Forensic Science
- Computer Forensics Objective and Need
- Cyber Crime
- Web Applications and Webservers Attacks
- Email Attacks
- Network Attacks
- Forensics on Mobile Devices
- Cyber Crime Investigation
- Reporting a Cyber Crime
- Expert Witness
Regulations, Policies and Ethics
- Searching and Seizing Computers with and without a Warrant
- Laws and Acts against Email Crimes
- Laws pertaining to Log Management
- Pertaining to Mobile Forensics
- General Ethics while Testifying
Digital Evidence
- Introduction to Digital Evidence and types
- Rules of Evidence
- Electronic Evidence: Types and Collecting Potential Evidence
- Electronic Crime and Digital Evidence Consideration by Crime Category
- Computer Forensics Lab
- Understanding Hard Disks
- Disk Partitions and Boot Process
- Understanding File Systems (Windows | Linux | Mac OS X)
- File Carving
- Image Files
- Analyze Logs
- Database Forensics
- Email Headers and Analysis
- Malware Analysis
- Mobile Operating Systems
Procedures and Methodology
- Investigating Computer Crime
- Computer Forensics Investigation Methodology
- Digital Evidence Examination Process
- Encryption
- First Responder
- First Response Basics
- Roles of First Responder
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Log Management and Event Correlation
- Network Forensics (IDSs)
- Computer Forensics Reports and Investigative Report Writing
Digital Forensics
- Recover Data (Deleted Files & Partitions)
- Filesystem Analysis
- Operating Systems Forensics (Windows | Linux | Mac)
- Steganography and Image File Forensics
- Steganalysis
- Investigating and Analyzing Logs
- Investigating Network Traffic
- Web Attack Investigation
- Investigating Email Crime and Violation
- Mobile Forensic Process
- Cloud Forensics
- Malware Forensics
- Tools/ Systems/ Programs
- First Responder Toolkit
- Windows Forensic Tools (Helix3 Pro, X-Ways Forensics, Windows Forensic Toolchest (WFT), Autopsy, The Sleuth Kit (TSK), etc.)
- Data Acquisition Software Tools (UltraKit Forensic Falcon, etc.)
- Tools to defeat Anti-Forensics
- Steganography Tools
- Database Forensics Tools
- Password Cracking Tools
- Network Forensics Tools
FOR WHOM:
CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.
TRAINING METHODOLOGY
The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.
DATE:
1ST BATCH: 6th – 9th October, 2020
2ND BATCH: 13th – 16th April, 2021
THE COURSE FEE WILL COVER YOUR:
Tea/Coffee with snacks for breakfast, Lunch, Flash Drive & Training materials, Executive bag and writing materials, Group Photographs and Certificate.