Forensics Trainings
Courses | Description |
---|---|
Computer Hacking Forensic Investigator | Log Analysis • Incident Response Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • Cloud Forensics • Malware Forensics Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Investigating email crime • Mobile forensics • Forensics report writing and presentation. |
IIEH Professional Forensics Analyst | Log Analysis • Incident Response • 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act |
IIEH Digital Forensics Expert | Mobile Forensics • Forensics Imagine • Mobile Forensics • Forensics Imagine • Forensic Analysis of the evidence • Introduction to Forensics • History of Forensics • How to approach crime scene • Computer Investigation Process • Forensic Imaging of the evidence • Forensic Analysis of the evidence • Steganography • Email Crimes • Investigating attacks • Investigating Network & log • Forensic Report Writing • Types of investigation • Becoming an Expert witness |
Intrusion Detection and Analysis | SOC Best Practices • Indian IT Act • Wireshark • Security Information Management • OSSIM • Portscan Signature Detection • DNS Attack • RPC Buffer Overflow • SQL Injection • Incident Analysis • Concept of 6 A’s • Packet/Protocol Analysis • TCP/IP |
Course for Law Enforcement | Digital Forensics • Legal Challenges • Tools for audit and investigation • Computer Based Fraud & Implications • Fraud Case Studies • Financial Fraud Investigation Technique |
Fraud Detection, Investigation and Prevention | Inverse Logic • Tiger Team Test • Benford’s Theorem • Barium Test • Birbal Tricks and Traps • Accounting Fraud • Space-time dimension in data evaluation • surprise repetition in audit tests • CAAT • Evidence Collection • File Recovery • Email Tracing • Internet History • Data Dump Analysis • Transaction Log |
E-Crime and Computer Forensics | Stuxnet • Chain of custody • Dead Forensics • IT Act • Incident Response • Evidence Collection • Disc Based Forensics • Network Forensics • Log Analysis • EnCase • Live Forensics |