Course Features Course Duration: Basic: 20 hrs Advanced: 30 hrs Category: Computer Forensic Professional Certificate: YES Course Details Curriculum Certified Computer Forensics Professional (BASIC) (Module - I) Introduction to Computer, Network & Internet, Computer Hardware and its Components 1 of 17 (Module - I) Introduction to File Systems and Operating Systems 2 of 17 (Module - I) Introduction to different types of Cyber Crimes 3 of 17 (Module - I) Introduction to Cyber Crime Investigations 4 of 17 (Module - II) Introduction to Cyber Law, Indian IT ACT, Indian Evidence ACT, Indian Penal Code (Information Technology offenses), Indian Criminal Procedure Code (CrPc) for Search & Seizure procedures of Information Technology evidences 5 of 17 (Module - III) Introduction to Computer Forensics and Investigations 6 of 17 (Module - III) Introduction to Computer Forensics Tools & Techniques 7 of 17 (Module - III) Disk Imaging, Hash and cloning, Acquisition on Live System 8 of 17 (Module - III) Recovering Deleted Data 9 of 17 (Module - III) Searching Files by contents on a disk/partitions 10 of 17 (Module - III) Introduction to Password Cracking 11 of 17 (Module - III) Introduction to Digital Signatures 12 of 17 (Module - III) Data Hiding Techniques 13 of 17 (Module - III) Recovering and reading hidden/Encrypted files 14 of 17 (Module - III) Steganography, Investigating Steganography 15 of 17 (Module - IV) Demo cases on each different technologies and techniques used individually or in combinations by perpetrator 16 of 17 (Module - IV) Documentation & Presentation of Evidence (Expert Witnessing) 17 of 17 Certified Computer Forensic Professional (Advanced) (Module - I) Introduction to different types of Cyber Incidents 1 of 22 (Module - I) Introduction to Cyber Incidents Investigations 2 of 22 (Module - I) Introduction to Cyber Law, Indian IT ACT, Indian Evidence ACT, Indian Penal Code (Information Technology offenses), Indian Criminal Procedure Code (CrPc) for Search & Seizure procedures of Information Technology evidences. 3 of 22 (Module - II) Advanced Computer Forensics and Investigations 4 of 22 (Module - II) Advanced Computer Forensics Tools & Techniques 5 of 22 (Module - II) Disk Imaging, Hash and cloning, Acquisition on Live System 6 of 22 (Module - II) Recovering Deleted Data 7 of 22 (Module - II) Data Carving (Recovering un-recoverable, Meta data recovery) 8 of 22 (Module - II) Advanced Searching Files by types and contents on a disk/partitions 9 of 22 (Module - II) Advanced Password Cracking 10 of 22 (Module - II) Advanced Data Hiding Techniques 11 of 22 (Module - II) Recovering and reading hidden/Encrypted files 12 of 22 (Module - III) Advance Steganography, Investigating Steganography 13 of 22 (Module - III) Cryptography (Encryption & Decryption) 14 of 22 (Module - III) Digital Signatures 15 of 22 (Module - III) Internet incidents Investigations and Limitations. 16 of 22 (Module - III) Email Investigation, Tracking Email 17 of 22 (Module - III) Browser Forensics 18 of 22 (Module - III) Windows Operating System User Activity investigations in detailed 19 of 22 (Module - III) Introduction to Virtualization & Using Virtualization in Computer Forensics & Investigation 20 of 22 (Module - IV) Demo cases on each different technologies and techniques used individually or in combinations by perpetrator 21 of 22 (Module - IV) Documentation & Presentation of Evidence (Expert Witnessing) 22 of 22
(Module - I) Introduction to Computer, Network & Internet, Computer Hardware and its Components 1 of 17 (Module - I) Introduction to File Systems and Operating Systems 2 of 17 (Module - I) Introduction to different types of Cyber Crimes 3 of 17 (Module - I) Introduction to Cyber Crime Investigations 4 of 17 (Module - II) Introduction to Cyber Law, Indian IT ACT, Indian Evidence ACT, Indian Penal Code (Information Technology offenses), Indian Criminal Procedure Code (CrPc) for Search & Seizure procedures of Information Technology evidences 5 of 17 (Module - III) Introduction to Computer Forensics and Investigations 6 of 17 (Module - III) Introduction to Computer Forensics Tools & Techniques 7 of 17 (Module - III) Disk Imaging, Hash and cloning, Acquisition on Live System 8 of 17 (Module - III) Recovering Deleted Data 9 of 17 (Module - III) Searching Files by contents on a disk/partitions 10 of 17 (Module - III) Introduction to Password Cracking 11 of 17 (Module - III) Introduction to Digital Signatures 12 of 17 (Module - III) Data Hiding Techniques 13 of 17 (Module - III) Recovering and reading hidden/Encrypted files 14 of 17 (Module - III) Steganography, Investigating Steganography 15 of 17 (Module - IV) Demo cases on each different technologies and techniques used individually or in combinations by perpetrator 16 of 17 (Module - IV) Documentation & Presentation of Evidence (Expert Witnessing) 17 of 17
(Module - I) Introduction to different types of Cyber Incidents 1 of 22 (Module - I) Introduction to Cyber Incidents Investigations 2 of 22 (Module - I) Introduction to Cyber Law, Indian IT ACT, Indian Evidence ACT, Indian Penal Code (Information Technology offenses), Indian Criminal Procedure Code (CrPc) for Search & Seizure procedures of Information Technology evidences. 3 of 22 (Module - II) Advanced Computer Forensics and Investigations 4 of 22 (Module - II) Advanced Computer Forensics Tools & Techniques 5 of 22 (Module - II) Disk Imaging, Hash and cloning, Acquisition on Live System 6 of 22 (Module - II) Recovering Deleted Data 7 of 22 (Module - II) Data Carving (Recovering un-recoverable, Meta data recovery) 8 of 22 (Module - II) Advanced Searching Files by types and contents on a disk/partitions 9 of 22 (Module - II) Advanced Password Cracking 10 of 22 (Module - II) Advanced Data Hiding Techniques 11 of 22 (Module - II) Recovering and reading hidden/Encrypted files 12 of 22 (Module - III) Advance Steganography, Investigating Steganography 13 of 22 (Module - III) Cryptography (Encryption & Decryption) 14 of 22 (Module - III) Digital Signatures 15 of 22 (Module - III) Internet incidents Investigations and Limitations. 16 of 22 (Module - III) Email Investigation, Tracking Email 17 of 22 (Module - III) Browser Forensics 18 of 22 (Module - III) Windows Operating System User Activity investigations in detailed 19 of 22 (Module - III) Introduction to Virtualization & Using Virtualization in Computer Forensics & Investigation 20 of 22 (Module - IV) Demo cases on each different technologies and techniques used individually or in combinations by perpetrator 21 of 22 (Module - IV) Documentation & Presentation of Evidence (Expert Witnessing) 22 of 22