Computer Forensics and Investigation

Computer forensics is a scientific process of obtaining, preserving, and documenting the evidence from various electronic and...


Content Provider

40 hrs



Mode Of Delivery

Valid for 6 months post activation

Course Validity




Certification By

This is a paid course.

Course Fee

  • 1,800/-/- 599/-/-


Computer forensics is a scientific process of obtaining, preserving, and documenting the evidence from various electronic and digital storage devices namely, computers, mobile phones, digital cameras and memory storage devices. Digital evidence is collected and preserved by computer forensics investigators. The evidence collection should be done in a systematic manner following set rules and procedures in such a way that the collected digital evidence is authentic and not modified, only then the evidence will be admissible in the court of law or any legal proceedings.


Module 1: Computer Forensics

Introduction to Computer Forensics, Forms of Cyber Crime, First Responder Procedure- Non-technical staff, Technical Staff, Forensics Expert and Computer Investigation procedure.

Module 2: Storage Devices and Data Recovery Methods

Storage Devices - Magnetic Medium, Non-Magnetic Medium and Optical Medium. Working of Storage devices - Platter, Head assembly, Spindle Motor. Data Acquisition, Data deletion and data recovery method and techniques.

Module 3: Forensics Techniques

Windows Forensic, Linux Forensics, Mobile Forensics, Steganography, Application Password cracking-Brute force, Dictionary attack, Rainbow attack. Email Tacking – Header option of SMTP, POP3, IMAP.

Module 4: Cyber Law

Corporate Espionage, Evidence Handling Procedure, Chain of Custody, Main features of Indian IT Act 2008 (Amendment).

Learning Outcomes

  • Discuss the concept of computer forensics in detail
  • Explain the importance of knowing the rules for collecting and producing evidence in an acceptable form for the Court of Law
  • Discuss the computer investigating procedure
  • Differentiate between dissimilar storage media
  • Use windows recovery to recover previous working state
  • Differentiate between Hard Disk drive and removable memory
  • Discuss the concept of forensic data recovery

Who Should Attend?

  • Computer Science Engineering
  • Bachelors of Computer Application
  • Bachelors of Science
  • Master of Computer Applications

Job Prospects

  • SOC Analyst
  • IT Security Engineer
  • IT Security Operations Analyst
  • Security Analyst
  • SOC Support Engineer


After completing this course and successfully passing the certification examination, the student will be awarded the “Computer Forensics and Investigation” certification.

If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'.