Professional Computer Hacking Forensics Investigator Training (Live + Recorded)
Courses / Professional Computer Hacking Forensics Investigator Training (Live + Recorded)

Professional Computer Hacking Forensics Investigator Training (Live + Recorded) Video

Computer Hacking Forensics Investigator Professional Training is a specialized program designed to teach how to investigate cybercrimes and digital at...

5.0 (5 ratings)
210 students
5 modules
Spectrum Infotech
Hindi

About this course

Module 1: Computer Forensics in Today's World:

1.     Basic Computer Knowledge, Networking Fundamentals, Cyber Security Basics, File Systems & Storage Concepts, Basic Legal Awareness, Basic Mobile & Internet Knowledge Concepts Cyber,

2.     Crime, Types of Crime, Cyber Crime, Digital Forensics and Use of Digital Forensics and Linux Concept

3.     Lab Setup

Module 2: Introduction of Computer Forensics or Digital Forensics

1.     Recovering deleted files from the evidence

2.     Generating hashes and checksum files

3.     Calculating the MD5 value of the selected file

4.     Viewing files of various formats

5.     Analyzing an evidence file and generating investigative report.

6.     Creating a disk image file of a hard disk partition.

Module 3: Understanding Hard Disks and File Systems

1.     Analyze file system of Linux image file.

2.     Analyze file system of Windows image files.

3.     Recover files deleted from a hard disk.

Module 4: Data Acquisition and Duplication

1.     Creating a dd Image of a System Drive

2.     Converting Image File from E01 Format to dd Format.

3.     Mounting Images on a Linux Forensic Workstation.

4.     Converting Acquired Image File to a Bootable Virtual Machine.

5.     Acquiring RAM from Windows and Linux Workstations with Analysis.

6.    Viewing Contents of Forensic Image File.

Module 5: Defeating Anti-forensics Techniques

1.     SSD File Carving on a Windows File System.

2.     SSD File Carving on a Linux File System.

3.     Recovering Data from Lost/Deleted Disk Partition.

4.     Recovering Data from a Partition that is Deleted and Merged into another Partition.

5.     Cracking Application Passwords.

6.     Detecting Steganography.

7.     Detecting Alternate Data Streams.

8.     Detecting File Extension Mismatch.

9.     Unpacking Program Packers.

Module 6: Windows Forensics

1.     Acquiring Volatile Information from a Live Windows System.

2.     Investigating Forensic Image of Windows RAM.

3.     Examining Web Browser Artifacts.

4.     Discovering and Extracting Forensic Data from Computers. (OS Forensics)

5.     Extracting Information about Loaded Processes on a Computer.

6.     Viewing, Monitoring, and Analyzing Events Occurred on a Windows Machine.

7.     Performing Digital Forensic Investigation on a Computer. (Helix)

8.     Collecting and Parsing Forensic Artifacts on a Live Windows Machine.

Module 7: Linux and Mac Forensics

1.     Acquiring Volatile Data in Linux System.

2.     Investigating Forensic Images of Linux and Mac Systems.

3.     Performing Forensic Investigation on a Linux Memory Dump.

4.     Recovering Data from a Linux Memory Dump.

Module 8: Network Forensics

1.     Identifying and Investigating an FTP Brute Force Attack using Splunk.

2.     Investigating Network Attacks using Kiwi Log Viewer.

3.     Identifying and Investigating Various Network Attacks using Wireshark.

Module 9: Investigating Web Attack

1.     Detection and analysis of an XSS attack by examining Apache logs, Mod Security logs, and IIS logs.

2.     Detection and analysis of a SQL injection attack by examining Apache logs.

3.     Detection and analysis of a directory traversal attack by examining Apache logs, Mod Security logs, and IIS logs.

4.     Detection and analysis of a command injection attack by examining Apache logs.

5.     Detection and analysis of an XXE attack by examining Apache logs.

6.    Detection and analysis of a brute-force attack by examining Apache logs and IIS logs.

Module 10: Dark Web Forensics

1.     Discovering Tor Browser activity on a Windows machine.

2.     Examining RAM dumps to discover Tor Browser artifacts.

Module 11: Database Forensics

1.     Analyzing SQLite Databases.

2.     Performing Forensic Investigation on MySQL Database.

Module 12: Cloud Forensics

1.     Examining Log Data on Amazon CloudWatch Console.

2.     Forensically Acquiring and Examining an Amazon EC2 Instance.

3.     Forensically Acquiring and Examining an Azure VM.

Module 13: Investigating Email Crimes

1.     Investigating a Suspicious Email.

2.     Recovering Deleted Email Messages Using Recover My Email.

3.     Recovering Deleted Email Messages Using Paraben’s E3: Universal.

Module 14: Malware Forensics

1.     Performing Static Analysis on a Suspicious File.

2.     Forensic Examination of a Suspicious PDF File.

3.     Forensic Examination of a Suspicious Microsoft Office Document.

4.     Examining a Suspicious File Using Open Resources.

5.     Emotet Malware Analysis.

Module 15: Mobile Forensics

1.     Performing Data Acquisition on Android Mobile Device.

2.     Analyzing Android Forensic Image and Carving Deleted Files.

Module 16: loT Forensics

1.     Performing IOT Forensics.

Cyber Crime Investigation:

1.   Concept of Crime and Cyber Crime

2.   Fraud Investigation

3.   IPDR Analysis in Details

4.   All types of Social Media Investigation

5.   All others Investigation related to Digital Forensics


What you'll learn

  • Master the fundamentals and advanced concepts
  • Build real-world projects and applications
  • Learn from industry experts and professionals
  • Get lifetime access to course materials
  • Receive a certificate of completion
  • Access to course updates and new content

Course content

  • 1. Module 1: Computer Forensics in Todays World
    Video
    • 1.1 Class 1: Introduction
    • 1.2 Class 2: Lab Setup with Module 2 (CHFI)
    • 1.3 How to Install Data Recovery Software ?
  • 2. Module 2
    Video
    • 2.1 Class 3: Image File Related Practical of CHFI
  • 3. Module 3
    Video
    • 3.1 Class 4: Analyze file system of image file.
  • 4. Module 4 : Data Acquisition and Duplication
    Video
    • 4.1 Class 5: Image File and RAM Analysis etc. Related Practical of CHFI
  • 5. Module 5 : Defeating Anti-forensics Techniques
    Video
    • 5.1 Class 6 : Defeating Anti-forensics Techniques - Part 1
    • 5.2 Class 7 : Defeating Anti-forensics Techniques Part 2
₹15,999.00 ₹13,999.00
This course includes:
  • Full lifetime Access
  • Access on Mobile , Desktop and Laptop
  • Certificate of Completion
  • Downloadable Resources
Secure payment with Razorpay