Forensics Trainings

CoursesDescription
Computer Hacking Forensic Investigator
Log Analysis • Incident Response
Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • Cloud Forensics • Malware Forensics Network Forensics • Packet Analysis • Digital Forensics
• Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Investigating email crime • Mobile forensics • Forensics report writing and presentation.

IIEH Professional Forensics Analyst
Log Analysis • Incident Response
• 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition
• Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics
• Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Digital Forensics
• Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act

IIEH Digital Forensics Expert
Mobile Forensics • Forensics Imagine
• Mobile Forensics • Forensics Imagine • Forensic Analysis of the evidence
• Introduction to Forensics • History of Forensics • How to approach crime scene • Computer Investigation Process • Forensic Imaging of the evidence
• Forensic Analysis of the evidence • Steganography • Email Crimes • Investigating attacks • Investigating Network & log
• Forensic Report Writing • Types of investigation • Becoming an Expert witness

Intrusion Detection and Analysis
SOC Best Practices • Indian IT Act
• Wireshark • Security Information Management • OSSIM • Portscan Signature Detection
• DNS Attack • RPC Buffer Overflow • SQL Injection • Incident Analysis • Concept of 6 A’s • Packet/Protocol Analysis
• TCP/IP

Course for Law Enforcement
Digital Forensics • Legal Challenges
• Tools for audit and investigation • Computer Based Fraud & Implications • Fraud Case Studies
• Financial Fraud Investigation Technique

Fraud Detection, Investigation and Prevention
Inverse Logic • Tiger Team Test
• Benford’s Theorem • Barium Test • Birbal Tricks and Traps • Accounting Fraud
• Space-time dimension in data evaluation • surprise repetition in audit tests
• CAAT • Evidence Collection • File Recovery • Email Tracing • Internet History
• Data Dump Analysis • Transaction Log

E-Crime and Computer Forensics
Stuxnet • Chain of custody
• Dead Forensics • IT Act • Incident Response • Evidence Collection
• Disc Based Forensics • Network Forensics • Log Analysis • EnCase • Live Forensics