Description
WHOM IS IT APPLICABLE
- EHE (Ethical Hacking Expert)
- Network Operation Center (NOC)
- Security Operational Center (SOC)
- Cyber Crime Officer
- Cyber Crime Investigator
- Defense and Military
- e-business Security Professionals
- System Administrator
- Legal professionals
- Banking, insurance and other professionals,
- Government Agencies
- IT Managers
- Government Agencies etc.,
WHAT YOU WILL LEARN
After completing this course, you will be able to:
- Identify types of digital evidence
- Recover lost files and partitions on different OS platforms
- Carry out computer forensics process
- Capture and manage logs
- Apply different investigating techniques to solve attacks on network, cloud and virtual systems
- Perform e-mail crime investigation
- Investigate attacks on mobile devices
- Use forensic tools and preparing documentations
MODULE OVERVIEW
SFICH 1
Module 1: Introduction to Computer Forensics
Module 2: Introduction to Digital Evidence
Module 3: Understanding Hard Disks
Module 4: File Systems: Windows, Linux and Mac OSX
Module 5: Computer Forensics Investigation Process
Module 6: Searching and Seizing
SFICH 2
Module 7: Data Acquisition and Duplication
Module 8: Understanding Incident Response Procedures
Module 9: Forensics and Operating Systems
Module 10: Steganography: An Overview
Module 11: Investigating Email Crimes
SFICH 3
Module 12: Network Forensics
Module 13: Investigating Web Attacks
Module 14: Mobile Forensics
Module 15: Cloud Forensics
Module 16: Virtualisation and Forensics
Module 17: Database Forensics
Module 18: Dealing with Anti-Forensics Techniques
Module 19: Malware Forensics
Module 20: Digital Forensic Investigation Using Encase Forensic
Module 21: Forensics Report Writing
PREREQUISITES
- Minimum 2 years of experience in security and Forensic