Computer Hacking Forensics Investigator Professional Training is a specialized program designed to teach how to investigate cybercrimes and digital at...
1. Basic Computer Knowledge, Networking Fundamentals, Cyber Security Basics, File Systems & Storage Concepts, Basic Legal Awareness, Basic Mobile & Internet Knowledge Concepts Cyber,
2. Crime, Types of Crime, Cyber Crime, Digital Forensics and Use of Digital Forensics and Linux Concept
3. Lab Setup
1. Recovering deleted files from the evidence
2. Generating hashes and checksum files
3. Calculating the MD5 value of the selected file
4. Viewing files of various formats
5. Analyzing an evidence file and generating investigative report.
6. Creating a disk image file of a hard disk partition.
1. Analyze file system of Linux image file.
2. Analyze file system of Windows image files.
3. Recover files deleted from a hard disk.
1. Creating a dd Image of a System Drive
2. Converting Image File from E01 Format to dd Format.
3. Mounting Images on a Linux Forensic Workstation.
4. Converting Acquired Image File to a Bootable Virtual Machine.
5. Acquiring RAM from Windows and Linux Workstations with Analysis.
6. Viewing Contents of Forensic Image File.
1. SSD File Carving on a Windows File System.
2. SSD File Carving on a Linux File System.
3. Recovering Data from Lost/Deleted Disk Partition.
4. Recovering Data from a Partition that is Deleted and Merged into another Partition.
5. Cracking Application Passwords.
6. Detecting Steganography.
7. Detecting Alternate Data Streams.
8. Detecting File Extension Mismatch.
9. Unpacking Program Packers.
1. Acquiring Volatile Information from a Live Windows System.
2. Investigating Forensic Image of Windows RAM.
3. Examining Web Browser Artifacts.
4. Discovering and Extracting Forensic Data from Computers. (OS Forensics)
5. Extracting Information about Loaded Processes on a Computer.
6. Viewing, Monitoring, and Analyzing Events Occurred on a Windows Machine.
7. Performing Digital Forensic Investigation on a Computer. (Helix)
8. Collecting and Parsing Forensic Artifacts on a Live Windows Machine.
1. Acquiring Volatile Data in Linux System.
2. Investigating Forensic Images of Linux and Mac Systems.
3. Performing Forensic Investigation on a Linux Memory Dump.
4. Recovering Data from a Linux Memory Dump.
1. Identifying and Investigating an FTP Brute Force Attack using Splunk.
2. Investigating Network Attacks using Kiwi Log Viewer.
3. Identifying and Investigating Various Network Attacks using Wireshark.
1. Detection and analysis of an XSS attack by examining Apache logs, Mod Security logs, and IIS logs.
2. Detection and analysis of a SQL injection attack by examining Apache logs.
3. Detection and analysis of a directory traversal attack by examining Apache logs, Mod Security logs, and IIS logs.
4. Detection and analysis of a command injection attack by examining Apache logs.
5. Detection and analysis of an XXE attack by examining Apache logs.
6. Detection and analysis of a brute-force attack by examining Apache logs and IIS logs.
1. Discovering Tor Browser activity on a Windows machine.
2. Examining RAM dumps to discover Tor Browser artifacts.
1. Analyzing SQLite Databases.
2. Performing Forensic Investigation on MySQL Database.
1. Examining Log Data on Amazon CloudWatch Console.
2. Forensically Acquiring and Examining an Amazon EC2 Instance.
3. Forensically Acquiring and Examining an Azure VM.
1. Investigating a Suspicious Email.
2. Recovering Deleted Email Messages Using Recover My Email.
3. Recovering Deleted Email Messages Using Paraben’s E3: Universal.
1. Performing Static Analysis on a Suspicious File.
2. Forensic Examination of a Suspicious PDF File.
3. Forensic Examination of a Suspicious Microsoft Office Document.
4. Examining a Suspicious File Using Open Resources.
5. Emotet Malware Analysis.
1. Performing Data Acquisition on Android Mobile Device.
2. Analyzing Android Forensic Image and Carving Deleted Files.
1. Performing IOT Forensics.
1. Concept of Crime and Cyber Crime
2. Fraud Investigation
3. IPDR Analysis in Details
4. All types of Social Media Investigation
5. All others Investigation related to Digital Forensics