Online Certificate Courses

Virtual Internship




Computer Forensics and Investigation
Categories:
Information Technology
Best Seller
Description
Computer forensics is a scientific process of obtaining, preserving, and documenting the evidence from various electronic and digital storage devices namely, computers, mobile phones, digital cameras and memory storage devices. Digital evidence is collected and preserved by computer forensics investigators. The evidence collection should be done in a systematic manner following set rules and procedures in such a way that the collected digital evidence is authentic and not modified, only then the evidence will be admissible in the court of law or any legal proceedings.

Curriculum

Module 1: Computer Forensics

Introduction to Computer Forensics, Forms of Cyber Crime, First Responder Procedure- Non-technical staff, Technical Staff, Forensics Expert and Computer Investigation procedure.

Module 2: Storage Devices and Data Recovery Methods

Storage Devices - Magnetic Medium, Non-Magnetic Medium and Optical Medium. Working of Storage devices - Platter, Head assembly, Spindle Motor. Data Acquisition, Data deletion and data recovery method and techniques.

Module 3: Forensics Techniques

Windows Forensic, Linux Forensics, Mobile Forensics, Steganography, Application Password cracking-Brute force, Dictionary attack, Rainbow attack. Email Tacking – Header option of SMTP, POP3, IMAP.

Module 4: Cyber Law

Corporate Espionage, Evidence Handling Procedure, Chain of Custody, Main features of Indian IT Act 2008 (Amendment).

Learning Outcomes

  • Discuss the concept of computer forensics in detail
  • Explain the importance of knowing the rules for collecting and producing evidence in an acceptable form for the Court of Law
  • Discuss the computer investigating procedure
  • Differentiate between dissimilar storage media
  • Use windows recovery to recover previous working state
  • Differentiate between Hard Disk drive and removable memory
  • Discuss the concept of forensic data recovery

Who Should Attend?

  • Computer Science Engineering
  • Bachelors of Computer Application
  • Bachelors of Science
  • Master of Computer Applications

Job Prospects

  • SOC Analyst
  • IT Security Engineer
  • IT Security Operations Analyst
  • Security Analyst
  • SOC Support Engineer

Certification

After completing this course and successfully passing the certification examination, the student will be awarded the “Computer Forensics and Investigation” certification.

If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'.


Faculty Profiles
Frequently Asked Questions