Computer Hacking Forensics Investigator Professional Training (Live + Recorded)
Courses / Computer Hacking Forensics Investigator Professional Training (Live + Recorded)

Computer Hacking Forensics Investigator Professional Training (Live + Recorded) Video

Computer Hacking Forensics Investigator Professional Training is a specialized program designed to teach how to investigate cybercrimes and digital at...

5.0 (15 ratings)
210 students
5 modules
Spectrum Infotech
Bengali

About this course

Module 1: Computer Forensics in Today's World:

1.     Basic Computer Knowledge, Networking Fundamentals, Cyber Security Basics, File Systems & Storage Concepts, Basic Legal Awareness, Basic Mobile & Internet Knowledge Concepts Cyber,

2.     Crime, Types of Crime, Cyber Crime, Digital Forensics and Use of Digital Forensics and Linux Concept

3.     Lab Setup

Module 2: Introduction of Computer Forensics or Digital Forensics

1.     Recovering deleted files from the evidence

2.     Generating hashes and checksum files

3.     Calculating the MD5 value of the selected file

4.     Viewing files of various formats

5.     Analyzing an evidence file and generating investigative report.

6.     Creating a disk image file of a hard disk partition.

Module 3: Understanding Hard Disks and File Systems

1.     Analyze file system of Linux image file.

2.     Analyze file system of Windows image files.

3.     Recover files deleted from a hard disk.

Module 4: Data Acquisition and Duplication

1.     Creating a dd Image of a System Drive

2.     Converting Image File from E01 Format to dd Format.

3.     Mounting Images on a Linux Forensic Workstation.

4.     Converting Acquired Image File to a Bootable Virtual Machine.

5.     Acquiring RAM from Windows and Linux Workstations with Analysis.

6.    Viewing Contents of Forensic Image File.

Module 5: Defeating Anti-forensics Techniques

1.     SSD File Carving on a Windows File System.

2.     SSD File Carving on a Linux File System.

3.     Recovering Data from Lost/Deleted Disk Partition.

4.     Recovering Data from a Partition that is Deleted and Merged into another Partition.

5.     Cracking Application Passwords.

6.     Detecting Steganography.

7.     Detecting Alternate Data Streams.

8.     Detecting File Extension Mismatch.

9.     Unpacking Program Packers.

Module 6: Windows Forensics

1.     Acquiring Volatile Information from a Live Windows System.

2.     Investigating Forensic Image of Windows RAM.

3.     Examining Web Browser Artifacts.

4.     Discovering and Extracting Forensic Data from Computers. (OS Forensics)

5.     Extracting Information about Loaded Processes on a Computer.

6.     Viewing, Monitoring, and Analyzing Events Occurred on a Windows Machine.

7.     Performing Digital Forensic Investigation on a Computer. (Helix)

8.     Collecting and Parsing Forensic Artifacts on a Live Windows Machine.

Module 7: Linux and Mac Forensics

1.     Acquiring Volatile Data in Linux System.

2.     Investigating Forensic Images of Linux and Mac Systems.

3.     Performing Forensic Investigation on a Linux Memory Dump.

4.     Recovering Data from a Linux Memory Dump.

Module 8: Network Forensics

1.     Identifying and Investigating an FTP Brute Force Attack using Splunk.

2.     Investigating Network Attacks using Kiwi Log Viewer.

3.     Identifying and Investigating Various Network Attacks using Wireshark.

Module 9: Investigating Web Attack

1.     Detection and analysis of an XSS attack by examining Apache logs, Mod Security logs, and IIS logs.

2.     Detection and analysis of a SQL injection attack by examining Apache logs.

3.     Detection and analysis of a directory traversal attack by examining Apache logs, Mod Security logs, and IIS logs.

4.     Detection and analysis of a command injection attack by examining Apache logs.

5.     Detection and analysis of an XXE attack by examining Apache logs.

6.    Detection and analysis of a brute-force attack by examining Apache logs and IIS logs.

Module 10: Dark Web Forensics

1.     Discovering Tor Browser activity on a Windows machine.

2.     Examining RAM dumps to discover Tor Browser artifacts.

Module 11: Database Forensics

1.     Analyzing SQLite Databases.

2.     Performing Forensic Investigation on MySQL Database.

Module 12: Cloud Forensics

1.     Examining Log Data on Amazon CloudWatch Console.

2.     Forensically Acquiring and Examining an Amazon EC2 Instance.

3.     Forensically Acquiring and Examining an Azure VM.

Module 13: Investigating Email Crimes

1.     Investigating a Suspicious Email.

2.     Recovering Deleted Email Messages Using Recover My Email.

3.     Recovering Deleted Email Messages Using Paraben’s E3: Universal.

Module 14: Malware Forensics

1.     Performing Static Analysis on a Suspicious File.

2.     Forensic Examination of a Suspicious PDF File.

3.     Forensic Examination of a Suspicious Microsoft Office Document.

4.     Examining a Suspicious File Using Open Resources.

5.     Emotet Malware Analysis.

Module 15: Mobile Forensics

1.     Performing Data Acquisition on Android Mobile Device.

2.     Analyzing Android Forensic Image and Carving Deleted Files.

Module 16: loT Forensics

1.     Performing IOT Forensics.

Cyber Crime Investigation:

1.   Concept of Crime and Cyber Crime

2.   Fraud Investigation

3.   IPDR Analysis in Details

4.   All types of Social Media Investigation

5.   All others Investigation related to Digital Forensics

What you'll learn

  • Master the fundamentals and advanced concepts
  • Build real-world projects and applications
  • Learn from industry experts and professionals
  • Get lifetime access to course materials
  • Receive a certificate of completion
  • Access to course updates and new content

Course content

  • 1. Module 1: Computer Forensics in Todays World
    Video
    • 1.1 Class 1: Introduction
    • 1.2 Class 2: Computer Hacking Forensics Investigator (Lab Setup, Block Diagram of Computer and Hash)
  • 2. Module 2: Introduction of Computer Forensics or Digital Forensics
    Video
    • 2.1 Class 3: Computer Hacking Forensics Investigator (Generating hashes, checksum, Process of Digital Forensics and Recovering deleted files from the evidence)
    • 2.2 Class 4: Viewing Files of Various Formats , Image File Creation, RAM Dump File Creation
  • 3. Module 3 : Understanding Hard Disks and File Systems
    Video
    • 3.1 Class 5: Analyze file system of image file (Linux, Windows and MAC System) + RAM Analysis
  • 4. Module 4 : Data Acquisition and Duplication
    Video
    • 4.1 Class 6 : Analyze file system of Windows image files, E01 Format to dd Format and Mounting Images on a Linux/Windows , Image File to a Bootable Virtual Machine
  • 5. Module 5 : Defeating Anti-forensics Techniques
    Video
    • 5.1 Class 7: Creating a dd Image of a System Drive, SSD File Carving on a Windows/Linux File System, Recovering Data from Lost/Deleted Disk Partition, Recovering Data from a Partition that is Deleted and Merged into another Partition and 5. Cracking Applicati
    • 5.2 Class 8: Detecting Steganography, Detecting Alternate Data Streams and Unpacking Program Packers.
    • 5.3 Class 9: Practice Class
₹15,999.00 ₹13,999.00
This course includes:
  • Full lifetime Access
  • Access on Mobile , Desktop and Laptop
  • Certificate of Completion
  • Downloadable Resources
Secure payment with Razorpay