Certified Computer Hacking & Forensic Expert

Certified Computer hacking and forensic Expert is the collection, preservation, analysis, identification and presentation of computer related evidence that can be useful in criminal cases for the purpose of facilitation or furthering the reconstruction of events found to be criminal.

There are three things to take into consideration when carrying out computer forensic. A computer can be the target of the crime, it can be the instrument of the crime or it can serve as an evidence repository storing valuable information about the crime. Knowing what role the computer played in the crime can of tremendous help when searching for evidence. This knowledge can also help reduce the time taken to find your evidence.

Computer hacking and forensic expert is one of the largest growing professional certifications. The main goals of computer forensics are the preservation, identification, extraction, documentation and interpretation of recovered computer data.

Scope of forensic science in india

With the rising number of incidents of crime regarding hacking and fraud in India, the scope of forensic science is definitely rising. Today there are some job related to Forensic Science in both the Government and Private Sectors are available likeā€¦ in Crime Branches, CBI, CID, Police, Investigation Bureau, Defense/Army, Courts, Narcotics Dept.,Universities, Detective Agencies, Banks, Insurance Companies.

Duration

Duration

2 hours per day x 45 days

Eligibility

Eligibility

Advanced knowledge of Ā Information Security

Course Details

  • What is forensics?
  • Professions needing forensics
  • Differences with legal investigations
  • Reasons for corporate investigations
  • Preparing for an investigation
  • Forensic workstation
  • Encase
  • Ftk
  • Coroners toolkit
  • Prodiscover basic
  • Audit policies
  • Reporting
  • Unix tools
  • Sleuth kit
  • Deft linux
  • Windows family
  • Mac os x
  • Linux
  • Other types of operating systems
  • Boot processes
  • File systems: windows-based
  • File systems: linux
  • File systems: mac os
  • File systems: cd
  • Raid
  • Autostarting
  • Executable types and structure: windows
  • Executable types and structure: unix-based
  • Disk partitions
  • Image formats
  • Image acquisitions under linux
  • Image acquisitions under windows
  • Volatile information
  • Data recovery
  • Hard drives
  • Osi reference model
  • Tcp/ip
  • Network attacks
  • Reasons for network acquisitions
  • Man in the middle attacks
  • Capturing traffic
  • Network miner
  • Other network tools
  • Wireless networking
  • Wireless tools
  • Firewalls and their uses
  • Intrusion detection systems
  • Alternate data streams
  • Deleted files
  • Hidden partitions
  • Slack space and swap file
  • Registry
  • Virtual memory
  • System recovery checkpoints: windows
  • Audit logs and settings
  • Graphics files
  • E-mail
  • Internet: cache, cookies, etc.
  • Metadata
  • Log files
  • Steganography
  • Steganography techniques: images and video
  • Steganography techniques: audio and documents
  • Steganalysis
  • Compression
  • Virtual machines
  • Checkpoints
  • Data formats
  • Hypervisors
  • IOS
  • Android
  • Symbian OS
  • Tools
  • Memory considerations
  • Sim cards
  • Malware forensics
  • Static malware analysis
  • Dynamic malware analysis