MODULE 01 : What is Computer Forensics
Understanding About Cyber Crimes & Cyber Attacks
Understanding About Data & Information
Understanding About Cyber Terrorism
MODULE 02 : Methods by which Computer gets Hacked
MODULE 03 : Computer Forensics Investigation Process
Cyber Crime Investigation
Type of Investigation-(Civil Investigation)
Type of Investigation-(Criminal Investigation)
Rules Of Forensics Investigation
What is Digital Evidence?
Roles Of Digital Evidence
MODULE 04 : Digital Evidence Gathering
MODULE 05 : Computer Forensics Lab
MODULE 06 : Setting up Forensics Lab
MODULE 07 : Understanding Hard Disk
MODULE 08 : File Systems Analysis : Linux/Window/mac
MODULE 09 : Windows File Systems forensics
MODULE 10 : Data Acquisition Tools and techniques
MODULE 11 : Data Imaging Techniques and Tools
MODULE 12 : Recovery Deleted Files and Folders
MODULE 13 : Deleted Partitions Recovery Technique
MODULE 14 : Forensics Investigations Using Forensics Toolkit (FTK)
MODULE 15 : Forensics Investigations Using Forensics Toolkit (Oxygen)
MODULE 16 : Forensics Investigations Using Encase Tool
MODULE 17 : Stenography and Image File Forensics
MODULE 18 : Application Password Crackers
MODULE 19 : Log Computing and Event Correlation
MODULE 20 : Network Forensics Tools : Cellebrite Tool
MODULE 21 : Investigating Tools
MODULE 22 : Investigating Network Traffic : Wireshark
MODULE 23 : Investigating Wireless Attacks
MODULE 24 : Investigating Web Application Attacks via Logs
MODULE 25 : Tracking and Investigating Various Email Crimes
MODULE 26 : Detailed Investiave Report
Computer Forensics – Investigation Techniques
Forensics Readiness & Benefits
Forensics Readiness Planning
Roles and Responsibilities
Forensic Investigator Tasks
What makes a Good Computer Forensics Investigator?
Legal Issues
Privacy Issues
Code of Ethics – Computer forensic investigator should be?
Code of Ethics – Computer forensic investigator should not be?
Computer Forensics : System Password Changes Techniques
System Password Changes on State (Windows 7)
System Password Changes on State (Windows 10)
Computer Forensics : System Password Cracking Techniques
System Password Cracking off State (Windows 7)
System Password Cracking off State (Windows 10)
System Password Cracking off State (Kali)
Web Attacks Investigation
What is Web Attacks Investigation of DOS & DDOS ?
Types of DOS & DDOS Attack
Propagation of Malicious Codes
Difference between DOS vs DDOS
Common DOS & DDOS Attacks Types Part 1
Common DOS & DDOS Attacks Types
DOS & DDOS Attacks Types Part 2
Common DOS & DDOS Attacks Types Part 3
Common DOS & DDOS Attacks Types Part 4
Case Management (Case Handling)
Case Management (Case Handling) Part 1
Case Management (Case Handling) Part 2
Case Management (Case Handling) Part 3
Case Management (Case Handling) Part 4
Case Management (Case Handling) Part 5 (Report)
Cyber Forensics : Firewall Handling
What is Firewall ?
Types of Firewall
Other Types of Firewall
IDS & IPS System
How the Honeypots provide security ?
Limitations of Firewall
Challenges Faced by Cyber Crime Investigators