Top Banner
10

Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

Jun 21, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation
Page 2: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

Course Outline of Cyber Forensics Investigation

❑ What is Computer Forensics❑ Methods By Which Computer Gets Hacked❑ Computer Forensics Investigation Process❑ Digital Evidence Gathering ❑ Computer Forensics Lab ❑ setting up Forensics Lab ❑ Understanding Hard Disks ❑ File Systems analysis : Linux/Windows/Mac❑ windows File System Forensics❑ Data Acquisition Tools and Techniques ❑ Data Imaging Techniques and Tools ❑ Recovery Deleted Files and Folders ❑ Deleted Pratitions Recovery Technique ❑ Forensics Investigations Using Forensics

Toolkit (FTK)

❑ Forensics Investigations Using Forensics Toolkit (OXYGEN)

❑ Forensics Investigations Using Encase Tool ❑ Stenography and Image File Forensics ❑ Application Password Crackers❑ Log Computing and Event Correlation❑ Network Forensics Tools : Cellebrite Tools❑ Investigating Tools❑ Investigating Network Traffic : Wireshark❑ Investigating Wireless Attacks ❑ Investigating Web Application Attacks Via

Logs ❑ Tracking and Investigating Various Email

Crimes ❑ Detailed Investigative Reporting

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in

Page 3: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

BENEFITS OFTRAINING

Training Certificate

Toolkit/ Software

Campus Ambassador

Workshop Passes

Goodies/ Gifts Exam1 Years

Membership

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in

Page 4: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

www.craw.inEmail:[email protected]

BATCH OPTIONS

WEEKDAY CLASSES

Monday to Friday

Duration : 2-3 Hours

Number of classes:40-50Hours(Instructor-Led Training)

WEEKEND CLASSES

Every Sunday and Saturday

Duration : 4 to 8hours.

Number of classes : (40-50Hours)

Regular Batch

Monday To FridayBatch

Timings

10:00 -12:00

1:00 –3:00

3:00 –5:00

5:00 –7:00

AlternateDays

Mon-Wed-Fri Tue-Thu-Sat

Batch Timings:

10:00 -12:00

1:00 –3:00

3:00 –5:00

5:00 –7:00

Weekend

Sat-Sun

BatchTimings:

10:00 -01:00

1:00 –4:00

4:00 –7:00

Sunday Only

BatchTimings:

9:00 -01:00

1:00 –5:00

5:00 –8:00

Call Us: +91-9650202445 | +919650677445

Page 5: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

TARGETAUDIENCEIndividuals▪ School Students▪ College Students▪ IT Professionals▪ IT Officers▪ IT and LAW

Officers

Corporate▪ IT Training Firms/Organizations/Society▪ IT Consultants▪ IT Experts▪ IT Officers▪ IT Institutions & Colleges▪ IT Graduated or Computer Science

Students

GovernanceSecurity Agencies | Security Groups | Govt. IT Institutions | IT Govt. & Security Officers.

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in

Page 6: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

Instructor-led training provides a comfortable teaching environment with instructors that are familiar

with the certification process and can help you master your certification exam. Find your instructor

now. There’s a wealth of training materials available that match your learning needs and learning style.

Whether you are studying on your own, or in a classroom environment, we recommend EC-Council and

CISCO Authorized Quality Curriculum training materials that will help you get ready for your

certification exam and pass the test

Classroom Training

Page 7: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

TAKE A CAMPUS TOUR

Page 8: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

TAKE A CAMPUSTOUR

Page 9: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

CONTACTUS

CRAWSECURITY

011-40394315 | +91-9650202445 | [email protected]

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate,Westend Marg, Behind Saket Metro Station,

New Delhi - 110030

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in

Page 10: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

THANKYOU

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in