CYBER CRIME INVESTIGATION
Duration: 4 Days
Day 1
Day 2
Day 3
Day 4
Day 1
- Introduction to Cyber Crime
- Cyber Space
- Jurisdiction
- Modus Operandi of Cyber Crime
- Types of Cyber Crime
- Advances and Bottlenecks
- Cyber Profiling
- Global Cyber crimes
- E-mail Frauds
- Spoofed E-mails
- Disposable E-mails
- Proxy Based E-mails
- Admissibility & Appreciation of E-mails
Day 2
- Social Networking Crimes
- WhatsApp Crimes
- Facebook Crimes
- Instagram Crimes
- LinkedIn Crimes
- Twitter Crimes
- Investigating Social Media Crimes
- Identifying between Spoofed & Genuine WhatsApp Account
- Identifying & Investigating a fake Facebook Account
- Tracking the origin of a fake Instagram Account
- Investigation of a fake LinkedIn & Twitter Account
- Securing Social Media Accounts
- Encryption
- Privacy Procedures
- Disclaimers
Day 3
- Online Frauds
- Internet / Banking Frauds
- Wallet Frauds
- Google Pay
- Amazon Pay Frauds
- Crypto Currency Frauds
- Identity Theft
- Plastic Money (Credit, Debit & NFC)
- Forensic Accounting
- Scanning & Reconnaissance
- Identifying & Detection of Digital Footprint of fake Bank accounts
- Tracking the Digital Footprint of a fake caller
- Identifying between genuine & spoofed Banking & E-commerce online Apps
- Letter of Rogatory (LR)
- Securing Online Apps
- Encryption & Decryption
- Privacy Procedures
- Digital Signatures
- Guidelines
Day 4
- Mobile Frauds
- Phishing Calls
- Phishing SMS
- Phishing Links
- SMS Bombing
- Investigation
- CDR Analysis
- Data Analysis
- Data Mining
- Collaborating Evidence to derive at conclusive investigation
- Extracting Evidence from Digital device
- Mobile Security
- Security Settings
- Antivirus
- GPS
- iOS & Android Architecture
- Cryptography
- Cyber Law
- Preamble of IT ACT 2000
- Amendments in IT ACT 2000
- Penalties & Adjudications
- Caselets