Forensic Investigator

Cyber-attacks are the fastest growing crime in the world, and they are increasing in size, sophistication, and cost. It is therefore imperative to understand ways and means to investigate the various cybercrimes committed. Forensic investigation is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. Star Forensic Investigator Computer Hacking (SFICH – 007) is a detailed course that explains the intricacies of a cybercrime and helps deduce its origin.

The program helps the learners acquire a fundamental understanding of tools and techniques to conduct forensic investigations, detailing all aspects of digital forensics from detecting an intruder’s footprints, to take necessary preventive steps, and to properly gather and process the evidence to prosecute in the court of law. The course aims to teach the learners about various investigation tools, eDiscovery, digital evidence collection, evidence preservation, e-mail investigation and recovery, e-mail and IP tracking, encryption and decryption methods, search and seizure of computers, recovering deleted evidences and password cracking.

Audience

  • Intermediate

Course Objectives

In this course, you will learn about:

  • Investigating cybercrime
  • Types of digital evidence and evaluating digital evidence
  • Examining and securing crime scenes
  • Recovering of files and partitions on different OS platforms
  • Computer forensics processes
  • Password breaking and investigation techniques for password attacks
  • Capturing and managing logs
  • Investigating techniques related to attacks on network, cloud and virtual systems
  • E-mail crime investigation
  • Investigating attacks on mobile and resolving
  • Using forensic tools and preparing documentations

Course Outcome

After competing this course, you will be able to:

  • Identify types of digital evidence
  • Recover lost files and partitions on different OS platforms
  • Carry out computer forensics process
  • Capture and manage logs
  • Apply different investigating techniques to solve attacks on network, cloud and virtual systems
  • Perform e-mail crime investigation
  • Investigate attacks on mobile devices
  • Use forensic tools and preparing documentations

Table Of Contents Outline

SFICH 1

  • Introduction to Computer Forensics
  • Introduction to Digital Evidence
  • Understanding Hard Disks
  • File Systems: Windows, Linux and Mac OSX
  • Computer Forensics Investigation Process
  • Searching and Seizing

SFICH 2

  • Data Acquisition and Duplication
  • Understanding Incident Response Procedures
  • Forensics and Operating Systems
  • Steganography: An Overview
  • Investigating Email Crimes

SFICH 3

  • Network Forensics
  • Investigating Web Attacks
  • Mobile Forensics
  • Cloud Forensics
  • Virtualisation and Forensics
  • Database Forensics
  • Dealing with Anti-Forensics Techniques
  • Malware Forensics
  • Digital Forensic Investigation Using Encase Forensic
  • Forensics Report Writing