CYBER FORENSICS TRAINING IN SURAT
1.OVERVIEW OF CYBER LAW
- INTRODUCTION OF CYBER CRIMES
- INTRODUCTION OF CYBER LAW
- PROCESS OF CYBER CRIME INVESTIGATION
- INTRODUCTION OF DIGITAL FORENSIC
- INTERNET CRIMES
- HOW TO INVESTIGATE OF CYBER CRIMES
- TYPES OF INVESTIGATION
2.COMPUTER FORENSICS
- WHAT IS COMPUTER FORENSICS
- REASONS FOR EVIDENCE
- TYPES OF EVIDENCE
- HO USES COMPUTER FORENSICS
- PROCESS OF COMPUTER FORENSIC
- HANDLING EVIDENCE
- COMPUTER FORENSIC REQUIREMENTS
- EVIDENCE PROCESSING GUIDELINES
3.FOOT PRINTING
- WHAT IS DOMAIN
- HOW TO GET DOMAIN
- DOMAIN PRIVACY
- DOMAIN INVESTIGATION WITH TOOLS
- DOMAIN INVESTIGATION WITHOUT TOOLS
- DOMAIN REPORTING
- INTRODUCTION OF HOSTING
- HOW TO SELECT HOSTING
- HOSTING SECURITY
- HOSTING SERVER INVESTIGATION
- WEBSITE BACKUP
- GHDB
- GOOGLE SEARCH
4.SYSTEMS FORENSIC
- LAST ACTIVITY FORENSIC
- DATABASE VIEW
- TURNS ON, OFF VIEW
- HANG PROGRAM VIEW
- ANTI-FORENSIC SYSTEM
- ALL UNINSTALLED PROGRAM VIEW
- PROCESS ACTIVITY VIEW
- ADVANCED SYSTEM FORENSIC WITH WIN HEX
- SYSTEM FORENSIC WITHOUT SOFTWARE
- FOLDER CHANGES VIEW
- PRODUCT KEY VIEW
- USB DRIVE VIEW
- CRASH REPORT VIEW
- FILE TYPES MANAGEMENT VIEW
- OPENED FILE VIEW
- SYSTEM’S FOLDER ACTIVITY TRACING
5.DATA ANALYSIS & RECOVERY
- INTRODUCTION OF DIGITAL FILE FORENSIC
- INTRODUCTION OF DATA RECOVERY
- TYPE OF DATA RECOVERY
- HARD DISK DATA RECOVERY
- HARD DISK PARTITION BACKUP
- USB DATA RECOVERY
- HARD DISK PARTITION CLONING
- ANTI FILE RECOVERY TOOL
- CD,DVD FILE RECOVERY
6.FORENSICS USING WIN HEX TOOL
- WHAT IS WIN HEX
- WHY USING WIN HEX
- CALCULATE HASH DIGEST FOR USE MD5
- FORENSIC DISK IMAGING USING WIN HEX
- CALCULATE HASH DIGEST FOR THE IMAGE FORENSIC
- DATA ACQUISITION ON A SYSTEM
- SEARCHING EVIDENCE
- RECOVERING DELETE EVIDENCE USING WIN HEX
- FILE RECOVERY BY TYPE
- RAM MEMORY EVIDENCE USING WIN HEX
- RAM MEMORY INVESTIGATION USING WIN HEX
7.IMAGE FILE FORENSIC
- WHAT IS IMAGE FILE FORENSIC
- TYPES OF PHOTOS
- IMAGE FORENSIC ONLINE TOOLS
- IMAGE FORENSIC TOOL
- IMAGE FILE RECOVER
- ANTIFORENSIC OF IMAGE FILE
- EDITED IMAGE FOR ANTI FORENSIC
8.FACE BOOK INVESTIGATION & SECURITY
- INTRODUCTION OF FACE BOOK CRIME
- FACE BOOK CRIME REPORTING
- FACE BOOK FAKE ID INVESTIGATION
- LAST VISITED USER ON FACEBOOK
- FACE BOOK DATA RECOVERY
- SOCIAL REPORTING
- VIDIO, IMAGES REPORTING
- LAW ENFORCEMENT ONLINE REQUESTS
- FACEBOOK AWESOME TRICKS
9.EMAIL INVESTIGATION & SECURITY
- HOW TO WORK OF EMAIL
- EMAIL SPOOFING
- SPAMMING MAILS
- EMAIL SECURITY
- EMAIL BLOCKING
- EMAIL BACKUP
- EMAIL INVESTIGATION
- EMAIL FILE ANALYST
- EMAIL ACTIVITY TRACKING
- EMAIL TRACKING
- IP TRACING
- EMAIL LOCKING
10.CRYPTOGRAPHY
- INTRODUCTION OF CRYPTOGRAPHY
- USES OF CRYPTOGRAPHY
- ONLINE CRYPTOGRAPHY TOOLS
- OFFLINE CRYPTOGRAPHY TOOLS
- TRUE CRYPT ENCRYPTION
- TRUE CRYPT DECRYPTION
- BIT LOCKER ENCRYPTION
- BIT LOCKER DECRYPTION
- HASH CALCULATOR
- DETECTOR TRUE, BIT,HASH
11.STEGANOGRAPHY
- INTRODUCTION OF STEGANOGRAPHY
- USES OF STEGANOGRAPHY
- STEGANOGRAPHY TECHNIQUES WITH SOFTWARE
- OFFLINE CRYPTOGRAPHY TOOLS
- STEGANOGRAPHY WITHOUT SOFTWARE
- STEGANOGRAPHY IMAGE BEHIND IMAGE
12.PASSWORD SECURITY & RECOVERY
- WORD, EXCEL PASSWORD SECURITY
- WORD, EXCEL PASSWORD RECOVERY
- PDF PASSWORD SECURITY
- PDF PASSWORD RECOVERY
- RAR PASSWORD SECURITY
- RAR PASSWORD RECOVERY
- FILE & FOLDER SECURITY
- ZIP PASSWORD SECURITY
- MEMARY CARD PASSWORD RECOVERY
- ALL IN ONE ZIP PASSWORD RECOVERY
- DICTIONARY WORD LIST
13.PHISHING PAGE INVESTIGATION
- WHAT IS PHISHING
- PHISHING PAGE DETECTION
- PHISHING PAGE REPORTING
- MAKE SECURITY AGAINST PHISHING PAGE
- SOCIAL ENGINEERING ATTACKS
- TAB NABBING ATTACK
14.NETWORK FORENSIC
- WHAT IS NETWORK FORENSIC
- ROLE OF NETWORK FORENSIC
- USE OF NETWORK FORENSIC
- NETWORK FORENSIC TOOLS
- NETWORK TOPOLOGY
- NETWORK FIREWALL SECURITY
- ARP POISONING
15.REGISTRY FORENSIC
- WHAT IS REGISTRY FORENSIC
- TOOLS OF REGISTRY FORENSIC
- WITHOUT SOFTWARE
16.BROWSER FORENSIC
- WHAT IS BROWSER
- BROWSER MODIFY
- BROWSER FORENSIC
- BROWSER FAKE LOCATION
- BROWSER MONITORY
- ANTI-MONITOR BROWSER
- BROWSER PROTECTION
17.MOBILE FORENSIC
- HOW TO MOBILE FORENSIC
18.MORPHING DETECTION
- WHAT IS MORPHING
- HOW TO DETECT MORPHING
- ANTI DETECTION MORPHING
19.CONTENT FORENSIC
- HOW TO CONTENT FORENSIC
20.CHILD ACTIVITY MONITORING
- HOW TO CHILD ACTIVITY MONITORING
21.NET BANKING SECURITY
- INTRODUCTION OF NET BANKING
- NET BANKING FRAUD
- CREDIT CARD PASSWORD SECURITY POLICY
- CREDIT CARD HACKING INVESTIGATION
- NET BANKING SECURITY
- TRUE CRYPT DECRYPTION
22.FORENSICS INVESTIGATIONS USING HIREN BOOT CD
- WHAT IS HIREN BOOT CD
- HOW TO INSTALL HIREN BOOT CD
- HOW TO PERFOME WITH ANTIVIRUS
- FAST COPY
- SPEED SEARCH
- DUPLICATE FILE FINDER
- DRIVER BACK UP
- SYSTEM PROCESS MONITOR
- SYSTEM PROCESS ACTIVITY
- HOW TO AUTO RUN FINDER
- CPU INFORMATION
- FULL INFORMATION OF COMPUTER SYSTEM
- INTERNAL EXTERNAL HARD DISK INFORMATION
- HOW TO AUTO RUN FINDER
- WINDOWS XP ANTI SPY
23.PROCESS FORENSIC
- PROCESS CHECKOUT
- PROCESS SECURITY CHECKOUT
- PROCESS VIEWER
- PROCESS MONITOR
24.MULTI ENGINE ANTIVIRUS SCANNER
- HOW TO MULTI ENGINE ANTIVIRUS SCANNER
25.INVESTIGATION PORNOGRAPHY
- WHAT IS PORNOGRAPHY
- HOW TO DETECT PORNOGRAPHY
- REPORTING PORNOGRAPHY
26.CASE REPORTING
- HOW TO CASE REPORTING