E-Crime and Computer Forensics

Hands-on Exercise & Case Studies in Cyber Crime & Forensics

The term cyber-crime no longer refers only to hackers and other external attackers. Almost all every case of financial fraud or employee misuse involves a very strong element of computer-based evidence. Network Intelligence has been providing professional computer forensics services to clients for the past six years. It now brings together its consolidated expertise into a three-day hands-on workshop. The entire workshop is driven by hands-on exercises and case studies to ensure that all aspects have a real-life scenario-based approach.


  • What should one do when there is a suspicion of a computer-based crime?
  • What tools and techniques are most likely to yield the right set of clues?
  • How should the investigation be carried out such that it can be presented in a court of law?
  • Hands-on practice with the worlds’ leading forensics tool – Encase

Course Contents

  • Module 1: Introduction & Case studies
  • Module 2: Principle of CIA
    • Against personals
    • Against corporate
    • Against governments
  • Module 3: Stuxnet – new era of attacks
  • Module 4: IT Act overview
  • Module 5: Introduction to Forensics
  • Module 6: Thump rules of investigation
  • Module 7: Type of forensics investigation
    • Live forensics
    • Dead forensics
  • Module 8: Pre-Incident Preparation
  • Module 9: Detection of Incidents
  • Module 10: Initial Response Phase
  • Module 11: Preserving “Chain of Custody”
  • Module 12: Response Strategy Formulation
  • Module 13: Evidence Collection and Analysis
  • Module 14: Defining Evidence Principle of CIA
  • Module 15: Forensically Sound Evidence Collection
  • Module 16: Evidence Handling
  • Module 17: Host vs Network Based Evidence
  • Module 18: Online vs Offline Response
  • Module 19: Digital Forensics - Putting on the Gloves
  • Module 20: The 6 A's
  • Module 21: The Investigative Guidelines
  • Module 22: Disk-based Forensics Vs Network-based Forensics
  • Module 23: Reporting the Investigation
  • Module 24: Understanding network crimes
  • Module 25: Analyzing logs
    • Network based log analysis
    • Web Server log analysis
  • Module 26: Data Acquisition & Analysis
  • Module 27: Encase forensics

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content