Forensics Trainings

Forensics Trainings

Courses Description Duration
Certified Professional Forensics Analyst (CPFA)
...Log Analysis • Incident Response... • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act 4 days
Certified Digital Forensics Expert (CDFE)
...Mobile Forensics • Forensics Imagine... • Mobile Forensics • Forensics Imagine • Forensic Analysis of the evidence • Introduction to Forensics • History of Forensics • How to approach to crime scene • Computer Investigation Process • Forensic Imaging of the evidence • Forensic Analysis of the evidence • Steganography • Email Crimes • Investigating attacks • Investigating Network & log • Forensic Report Writing • Types of investigation • Becoming an Expert witness 5 days
Intrusion Detection and Analysis
...SOC Best Practices • Indian IT Act... • Wireshark • Security Information Management • OSSIM • Portscan Signature Detection • DNS Attack • RPC Buffer Overflow • SQL Injection • Incident Analysis • Concept of 6 A’s • Packet/Protocol Analysis • TCP/IP 3 days
Course for Law Enforcement
...Digital Forensics • Legal Challenges... • Tools for audit and investigation • Computer Based Fraud & Implications • Fraud Case Studies • Financial Fraud Investigation Technique 2 days
Fraud Detection, Investigation and Prevention
...Inverse Logic • Tiger Team Test... • Benford’s Theorem • Barium Test • Birbal Tricks and Traps • Accounting Fraud • Space-time dimension in data evaluation • surprise repetition in audit tests • CAAT • Evidence Collection • File Recovery • Email Tracing • Internet History • Data Dump Analysis • Transaction Log 2 days
E-Crime and Computer Forensics
...Stuxnet • Chain of custody ... • Dead Forensics • IT Act • Incident Response • Evidence Collection • Disc Based Forensics • Network Forensics • Log Analysis • EnCase • Live Forensics 4 days

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content