Cyber Forensics
Duration: 3 Days
Day 1
Day 2
Day 3
Day 1
- Introduction to Cyber Forensics
- Information on Security Concepts
- Security Threats & Vulnerabilities
- Internet Architecture & DNS
- Name Space & Labels
- Heirarchy of Name Servers
- Zones & Domains
- Root Servers
- DNS used in the Internet
- DNS Messages Types
- Encapsulation
- Modus Operandi of Cyber Crime
- Types of Cyber Crime
- Advances and Bottlenecks
- Cyber Profiling
- Global Cyber crimes
Day 2
- Networking Forensics
- Packet Switching
- Data Sniffing
- Security
- O/S Forensics
- Memory Viewer
- Verifying & Creating HASH Value
- Disk Imaging
- Collection of Disk Information, Settings & Evidence
- Chain of Custody
- Seizure of Device
- Documentation
- Evidence Collection
- Sealing & Packaging
Day 3
- Video and Audio Forensics
- Authenticating video clips
- Irregularities and collection of evidence
- Report Generation
- Mobile Forensics
- Extracting data
- Data recovery
- Analysis and mining
- Documentation
- Google Forensics
- Google Timeline
- Recovery of stolen device
- Deleting & Wiping data
- Report Generation
- Cyber Law
- Preamble of IT ACT 2000
- Amendments in IT ACT 2000
- Penalties & Adjudications
- Caselets