Computer Hacking Forensic Investigator

10,899.99 (Inc. GST)

SKU: N/A Category:

The Computer Hacking Forensic Investigator (CHFI) course is designed for individuals aiming to pursue a career in Digital Forensics or Computer Forensics. This comprehensive program covers advanced data acquisition techniques and data retrieval methods in a forensically sound manner. You will learn how to collect, analyze, and present digital evidence that can withstand legal scrutiny in a court of law. Through real-time demonstrations of modern forensic techniques, methodologies, tools, and tricks, this course will equip you with the knowledge to handle evidence safely and effectively.

Prerequisites:

  • Basic computer knowledge
  • Understanding of ethical hacking concepts

Key Learning Outcomes:

By completing this course, you will be able to:

  • Acquire and retrieve data from different types of evidence media in a forensically sound manner.
  • Understand the technicalities and methodologies involved in digital evidence collection.
  • Apply forensic tools and techniques for effective data analysis and reporting.
  • Present digital evidence in court while maintaining its integrity.
  • Handle and safeguard digital evidence from various hacking and cybercrime-related cases.

Target Audience:

This course is ideal for:

  • Students looking to work in top-tier IT companies such as TCS, Infosys, Microsoft, Samsung, Google, Amazon, Facebook, Wipro, and other leading MNCs.
  • Individuals pursuing a career in digital or computer forensics.
  • M.Tech/B.Tech/MCA/BCA graduates or any diploma holders interested in the field of computer forensics.

Test & Evaluation:

  • Assignments: Participants are required to complete assignments throughout the course to enhance their learning.
  • Final Assessment: A final assessment will be conducted at the end of the course to evaluate the participant’s understanding of the concepts.

Certification:

  • Successful participants will receive a Certificate of Completion.
  • A Project Letter will be awarded upon the successful completion of the project.
  • Students who leave the course midway or do not complete it will not receive any certification.

Delivery Mode & Duration:

  • Mode: Online Live Sessions
  • Duration: 120 Hours (60 Hours of Online Live Sessions + 60 Hours of Assignments)

Additional information

Centre for Summer Training

IIT Kanpur Campus, Online Live

Batch Date

Batch 1, Batch 2

Curriculum

Module 1 – Computer Forensics in Today’s World

  • Understanding Computer Forensics
  • Cyber Crime (Types of Computer Crimes)
  • Cyber Crime Investigation
  • Rules of Forensics Investigation
  • Understanding Digital Evidence
  • Rules of Evidence
  • Forensics Readiness

Module 2 – Computer Forensics Investigation Process

  • Phases Involved in the Computer Forensics Investigation Process
  • Pre-investigation Phase
  • Investigation Phase
  • Post-investigation Phase

Module 3 – Understanding Hard Disks and File Systems

  • Hard Disk Drive Overview
  • Disk Partitions and Boot Process
  • Understanding File Systems
  • RAID Storage System
  • File System Analysis

Module 4 – Data Acquisition and Duplication

  • Data Acquisition and Duplication Concepts
  • Static Acquisition
  • Validate Data Acquisitions

Module 5 – Defeating Anti-forensics Techniques

  • Anti-Forensics techniques
  • Password Protection
  • Recovering the Deleted Partitions
  • Steganography
  • Steganalysis
  • Artifact Wiping

Module 6 – Operating System Forensics (Windows, Mac, Linux)

  • Windows Forensics
  • Linux Forensics
  • MAC Forensics

Module 7 – Network Forensics

  • Introduction to Network Forensics
  • Fundamental Logging Concepts
  • Event Correlation Concepts
  • Network Forensic Readiness
  • Network Traffic Investigation
  • Documenting the Evidence
  • Evidence Reconstruction

Module 8 – Investigating Web Attacks

  • Web Attack Investigation
  • Investigating Web Server Logs
  • Tools for Locating IP Address

Module 9 – Database Forensics

  • MSSQL Forensics
  • MySQL Forensics

Module 10 – Cloud Forensics

  • Usage of Cloud Forensics
  • Stakeholders and their Roles
  • Investigating Cloud Storage Services

Module 11 – Malware Forensics

  • Malware Analysis: Static
  • Malware Analysis: Dynamic
  • Analysis of Malicious Documents
  • Malware Analysis Challenges

Module 12 – Investigating Email Crimes

  • Email System
  • Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
  • Steps to Investigate Email Crimes and Violation
  • Examine E-mail Messages
  • Laws and Acts against Email Crimes

Module 13 – Mobile Phone & IOT Forensics

  • Mobile Forensics Process
  • Forensics Imaging
  • Platform Security Removal Techniques: Jailbreaking/Rooting
  • Android Forensics Analysis

Module 14 – Dark Web Forensics

  • Dark Web Forensics
  • Tor Browser Investigation
  • Checking Files

Module 15 – Forensics Report Writing and Presentation

  • Writing Investigation Reports
  • Expert Witness Testimony
  • Deposition
  • Dealing with Media

Enquiry