advance program – cyber crime investigation & forensics

Duration: 6 Days

Day 1
Day 2
Day 3
Day 4
Day 5
Day 6
Day 1

  • Introduction to Cyber Crime
    • Cyber Space
    • Jurisdiction
  • Modus Operandi of Cyber Crime
    • Types of Cyber Crime
    • Advances and Bottlenecks
    • Cyber Profiling
    • Global Cyber crimes
  • E-mail Frauds
    • Spoofed E-mails
    • Disposable E-mails
    • Proxy Based E-mails
    • Admissibility & Appreciation of E-mails

Day 2

  • Social Networking Crimes
    • WhatsApp Crimes
    • Facebook Crimes
    • Instagram Crimes
    • LinkedIn Crimes
    • Twitter Crimes
  • Investigating Social Media Crimes
    • Identifying between Spoofed & Genuine WhatsApp Account
    • Identifying & Investigating a fake Facebook Account
    • Tracking the origin of a fake Instagram Account
    • Investigation of a fake LinkedIn & Twitter Account
  • Securing Social Media Accounts
    • Encryption
    • Privacy Procedures
    • Disclaimers

Day 3

  • Online Frauds
    • Internet / Banking Frauds
    • Wallet Frauds
    • Google Pay
    • Amazon Pay Frauds
    • Crypto Currency Frauds
    • Identity Theft
    • Plastic Money (Credit, Debit & NFC)
    • Forensic Accounting
  • Scanning & Reconnaissance
    • Identifying & Detection of Digital Footprint of fake Bank accounts
    • Tracking the Digital Footprint of a fake caller
    • Identifying between genuine & spoofed Banking & E-commerce online Apps
    • Letter of Rogatory (LR)
  • Securing Online Apps
    • Encryption & Decryption
    • Privacy Procedures
    • Digital Signatures
    • Guidelines

Day 4

  • Mobile Frauds
    • Phishing Calls
    • Phishing SMS
    • Phishing Links
    • SMS Bombing
  • Investigation
    • CDR Analysis
    • Data Analysis
    • Data Mining
    • Collaborating Evidence to derive at conclusive investigation
    • Extracting Evidence from Digital device
  • Mobile Security
    • Security Settings
    • Antivirus
    • GPS?
    • iOS & Android Architecture
    • Cryptography

Day 5

  • Introduction to Cyber Forensics
    • Information on Security Concepts
    • Security Threats & Vulnerabilities
  • Networking Forensics
    • Packet Switching
    • Data Sniffing
    • Security
  • O/S Forensics
    • Memory Viewer
    • Verifying & Creating HASH Value
    • Disk Imaging
    • Collection of Disk Information, Settings & Evidence

Day 6

  • Chain of Custody
    • Seizure of Device
    • Documentation
    • Evidence Collection
    • Sealing & Packaging
  • Video and Audio Forensics
    • Authenticating video clips
    • Irregularities and collection of evidence
    • Report Generation
  • Mobile Forensics
    • Extracting data
    • Data recovery
    • Analysis and mining
    • Documentation
  • Google Forensics
    • Google Timeline
    • Recovery of stolen device
    • Deleting & Wiping data remotely
    • Report Generation
  • Cyber Law
      • Preamble of IT ACT 2000
      • Amendments in IT ACT 2000
      • Penalties & Adjudications
      • Caselets 

Eligibility : 12th and above from any stream, Working Professionals from (Law Enforcement agency, Judicial agency, Corporates, Education, Government Officials, Banks, Telecom, IT, BPO/KPO/LPO, ITES ….)

Full Time : Monday – Friday (10:30 am – 5:30 pm)

Part Time: Once a week on Saturday/Sunday (10:30 am – 5:30 pm)

Venue: Cyber Security Corporation @ Pune Training Center


Deliverables:
Expert Faculties |Live Case Studies |Certification

Fees: Rs. 36,000/- + 18% GST

For more details contact : +91 – 74988 95822 / 9637612097 or e-mail us on : support@cybersecuritycorp.in

Scroll to Top