Вы находитесь на странице: 1из 2

A SHORT TERM COURSE ON CYBER FORENSIC

Course Title: Introduction to Cyber Forensic Duration: 20 Hrs (2hrs /day) Course Fee: Rs. 1500/Pre-requisites: 1. Basic Knowledge of Computer. TOPICS COVERED:
Computer Forensic Overview Computer crime and digital evidence Forensics Investigation Process Court Admissibility of Digital Evidence Incident Response Data Acquisition and Duplication using software and hardware based tools. Forensic Analysis and Data Carving Windows Forensics Identification of past Internet Activities, E-Mail and Browser Forensics Recovering deleted Data and Partitions

Computer Forensics Course - Day 1&2: Lecture Class:


1. 2. 3. 4. Computer Forensics Fundamentals Forensics Investigation Process Court Admissibility of Digital Evidence Incident Response. Incident Reponse Reaction

Practical session:

Computer Forensics Course - Day 3&4: Lecture Class:


Data Acquisition and Duplication of Secondary Memory Hard Disk Fundamentals Sterilizing Evidence Media Forensic Duplication of Source Evidence Case Studies

Practical session: Demonstration of Acquisition of Secondary Memory using TruImager and cyber Check 3.0 Computer Forensics Course - Day 5&6: Lecture Class:
Forensic Analysis of Secondary memory File Signature Analysis. File System Analysis. Performing Searches. Data Carving. Recovering deleted Data and Partitions. Case Studies

Practical Session: Analysis of DD Image using Cybercheck 3.0 and Encase forensic Computer Forensics Course - Day 7&8: Lecture Class:
Windows Forensics Master Boot Record (MBR) Partitioning Windows File System (FAT, FAT32 and NTFS) Registry Fundamentals and Analysis File Extension, Headers and Thumbnails Analysis Internet Explorer Artifacts Practical Session: Demonstration on Acquisition and Analysis of Windows Registry Hive Files.

Computer Forensics Course - Day 9&10: Lecture Class:


Internet Forensics Reconstructing Past Internet Activities and Events Email Forensics: 1. E-mail Analysis (including Microsoft outlook) 2. Email Headers and Spoofing

Browser Forensics 1. Analyzing Cache and Temporary Internet Files 2. Cookie Storage and Analysis Practical Session: Demonstration on Tracing E-Mail Case Studies on E-Mail Forensics and Browser Forensics

Вам также может понравиться