MODULE 01 : What is Computer Forensics

MODULE 02 : Methods by which Computer gets Hacked

MODULE 03 : Computer Forensics Investigation Process

Cyber Crime Investigation
Type of Investigation-(Civil Investigation)
Type of Investigation-(Criminal Investigation)
Rules Of Forensics Investigation
What is Digital Evidence?
Roles Of Digital Evidence

MODULE 04 : Digital Evidence Gathering

MODULE 05 : Computer Forensics Lab

MODULE 06 : Setting up Forensics Lab

MODULE 07 : Understanding Hard Disk

MODULE 08 : File Systems Analysis : Linux/Window/mac

MODULE 09 : Windows File Systems forensics

MODULE 10 : Data Acquisition Tools and techniques

MODULE 11 : Data Imaging Techniques and Tools

MODULE 12 : Recovery Deleted Files and Folders

MODULE 13 : Deleted Partitions Recovery Technique

MODULE 14 : Forensics Investigations Using Forensics Toolkit (FTK)

MODULE 15 : Forensics Investigations Using Forensics Toolkit (Oxygen)

MODULE 16 : Forensics Investigations Using Encase Tool

MODULE 17 : Stenography and Image File Forensics

MODULE 18 : Application Password Crackers

MODULE 19 : Log Computing and Event Correlation

MODULE 20 : Network Forensics Tools : Cellebrite Tool

MODULE 21 : Investigating Tools

MODULE 22 : Investigating Network Traffic : Wireshark

MODULE 23 : Investigating Wireless Attacks

MODULE 24 : Investigating Web Application Attacks via Logs

MODULE 25 : Tracking and Investigating Various Email Crimes

MODULE 26 : Detailed Investiave Report

Computer Forensics – Investigation Techniques

Roles and Responsibilities

Computer Forensics : System Password Changes Techniques

Computer Forensics : System Password Cracking Techniques

Web Attacks Investigation

Common DOS & DDOS Attacks Types

Case Management (Case Handling)

Cyber Forensics : Firewall Handling