Computer forensics is a scientific process of obtaining, preserving, and documenting the evidence from various electronic and...
Mode Of Delivery
Module 1: Computer Forensics
Introduction to Computer Forensics, Forms of Cyber Crime, First Responder Procedure- Non-technical staff, Technical Staff, Forensics Expert and Computer Investigation procedure.
Module 2: Storage Devices and Data Recovery Methods
Storage Devices - Magnetic Medium, Non-Magnetic Medium and Optical Medium. Working of Storage devices - Platter, Head assembly, Spindle Motor. Data Acquisition, Data deletion and data recovery method and techniques.
Module 3: Forensics Techniques
Windows Forensic, Linux Forensics, Mobile Forensics, Steganography, Application Password cracking-Brute force, Dictionary attack, Rainbow attack. Email Tacking – Header option of SMTP, POP3, IMAP.
Module 4: Cyber Law
Corporate Espionage, Evidence Handling Procedure, Chain of Custody, Main features of Indian IT Act 2008 (Amendment).
Who Should Attend?
After completing this course and successfully passing the certification examination, the student will be awarded the “Computer Forensics and Investigation” certification.
If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'.