advance program - cyber crime investigation & forensics
Duration: 6 Days
Day 1
Day 2
Day 3
Day 4
Day 5
Day 6
Day 1
- Introduction to Cyber Crime
- Cyber Space
- Jurisdiction
- Modus Operandi of Cyber Crime
- Types of Cyber Crime
- Advances and Bottlenecks
- Cyber Profiling
- Global Cyber crimes
- E-mail Frauds
- Spoofed E-mails
- Disposable E-mails
- Proxy Based E-mails
- Admissibility & Appreciation of E-mails
Day 2
- Social Networking Crimes
- WhatsApp Crimes
- Facebook Crimes
- Instagram Crimes
- LinkedIn Crimes
- Twitter Crimes
- Investigating Social Media Crimes
- Identifying between Spoofed & Genuine WhatsApp Account
- Identifying & Investigating a fake Facebook Account
- Tracking the origin of a fake Instagram Account
- Investigation of a fake LinkedIn & Twitter Account
- Securing Social Media Accounts
- Encryption
- Privacy Procedures
- Disclaimers
Day 3
- Online Frauds
- Internet / Banking Frauds
- Wallet Frauds
- Google Pay
- Amazon Pay Frauds
- Crypto Currency Frauds
- Identity Theft
- Plastic Money (Credit, Debit & NFC)
- Forensic Accounting
- Scanning & Reconnaissance
- Identifying & Detection of Digital Footprint of fake Bank accounts
- Tracking the Digital Footprint of a fake caller
- Identifying between genuine & spoofed Banking & E-commerce online Apps
- Letter of Rogatory (LR)
- Securing Online Apps
- Encryption & Decryption
- Privacy Procedures
- Digital Signatures
- Guidelines
Day 4
- Mobile Frauds
- Phishing Calls
- Phishing SMS
- Phishing Links
- SMS Bombing
- Investigation
- CDR Analysis
- Data Analysis
- Data Mining
- Collaborating Evidence to derive at conclusive investigation
- Extracting Evidence from Digital device
- Mobile Security
- Security Settings
- Antivirus
- GPS
- iOS & Android Architecture
- Cryptography
Day 5
- Introduction to Cyber Forensics
- Information on Security Concepts
- Security Threats & Vulnerabilities
- Networking Forensics
- Packet Switching
- Data Sniffing
- Security
- O/S Forensics
- Memory Viewer
- Verifying & Creating HASH Value
- Disk Imaging
- Collection of Disk Information, Settings & Evidence
Day 6
- Chain of Custody
- Seizure of Device
- Documentation
- Evidence Collection
- Sealing & Packaging
- Video and Audio Forensics
- Authenticating video clips
- Irregularities and collection of evidence
- Report Generation
- Mobile Forensics
- Extracting data
- Data recovery
- Analysis and mining
- Documentation
- Google Forensics
- Google Timeline
- Recovery of stolen device
- Deleting & Wiping data remotely
- Report Generation
- Cyber Law
-
-
- Preamble of IT ACT 2000
- Amendments in IT ACT 2000
- Penalties & Adjudications
- Caselets
-