Computer forensics is a scientific process of obtaining, preserving, and documenting the evidence from various electronic and digital storage devices namely, computers, mobile phones, digital cameras and memory storage devices. Digital evidence is collected and preserved by computer forensics investigators. The evidence collection should be done in a systematic manner following set rules and procedures in such a way that the collected digital evidence is authentic and not modified, only then the evidence will be admissible in the court of law or any legal proceedings.
Module 1: Computer Forensics
Introduction to Computer Forensics, Forms of Cyber Crime, First Responder Procedure- Non-technical staff, Technical Staff, Forensics Expert and Computer Investigation procedure.
Module 2: Storage Devices and Data Recovery Methods
Storage Devices - Magnetic Medium, Non-Magnetic Medium and Optical Medium. Working of Storage devices - Platter, Head assembly, Spindle Motor. Data Acquisition, Data deletion and data recovery method and techniques.
Module 3: Forensics Techniques
Windows Forensic, Linux Forensics, Mobile Forensics, Steganography, Application Password cracking-Brute force, Dictionary attack, Rainbow attack. Email Tacking – Header option of SMTP, POP3, IMAP.
Module 4: Cyber Law
Corporate Espionage, Evidence Handling Procedure, Chain of Custody, Main features of Indian IT Act 2008 (Amendment).
Discuss the concept of computer forensics in detail
Explain the importance of knowing the rules for collecting and producing evidence in an acceptable form for the Court of Law
Discuss the computer investigating procedure
Differentiate between dissimilar storage media
Use windows recovery to recover previous working state
Differentiate between Hard Disk drive and removable memory
Discuss the concept of forensic data recovery
Who Should Attend?
Computer Science Engineering
Bachelors of Computer Application
Bachelors of Science
Master of Computer Applications
IT Security Engineer
IT Security Operations Analyst
SOC Support Engineer
After completing this course and successfully passing the certification examination, the student will be awarded the “Computer Forensics and Investigation” certification.
If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'.
Frequently Asked Questions
Course Features :
Mode Of Delivery:
Valid for 6 months post activation