Advanced Cyber Security (WTP)

2,542.37 Taxes as Applicable(GST)

Course Overview

This course is designed for students who wants to go in field of Computer Forensics or Digital Forensics. Computer Forensic is a comprehensive program focusing on latest way for data acquisition techniques and data retrieval techniques in forensically sound manner so that the evidence can be presented in the court. Real time demonstration of latest forensic techniques, methodologies, tools, tricks and integrity measures

Target Audience:

  • Students who want to learn Hacking and Ethical Hacking Concept
  • Tech/B.Tech/MCA/BCA/Any Graduate or Diploma Holder
  • Who wants to be Site administrators?

Key Learning Outcomes:

After completing this course, you will be able to know about forensically handle data and retrieval of data from any evidence media

Delivery Mode:

  • Online Live Instructor led learning.


Basic Computer Knowledge & Ethical Hacking Concepts


Module 1 – Computer Forensics in Today’s World

  • Understanding Computer Forensics
  • Cyber Crime (Types of Computer Crimes)
  • Cyber Crime Investigation
  • Rules of Forensics Investigation
  • Understanding Digital Evidence
  • Rules of Evidence
  • Forensics Readiness

Module 2 – Computer Forensics Investigation Process

  • Phases Involved in the Computer Forensics Investigation Process
  • Pre-investigation Phase
  • Investigation Phase
  • Post-investigation Phase

Module 3 – Understanding Hard Disks and File Systems

  • Hard Disk Drive Overview
  • Disk Partitions and Boot Process
  • Understanding File Systems
  • RAID Storage System
  • File System Analysis

Module 4 – Data Acquisition and Duplication

  • Data Acquisition and Duplication Concepts
  • Static Acquisition
  • Validate Data Acquisitions

Module 5 – Defeating Anti-forensics Techniques

  • Anti-Forensics techniques
  • Password Protection
  • Recovering the Deleted Partitions
  • Steganography
  • Steganalysis
  • Artifact Wiping

Module 6 – Operating System Forensics (Windows, Mac, Linux)

  • Windows Forensics
  • Linux Forensics
  • MAC Forensics

Module 7 – Network Forensics

  • Introduction to Network Forensics
  • Fundamental Logging Concepts
  • Event Correlation Concepts
  • Network Forensic Readiness
  • Network Traffic Investigation
  • Documenting the Evidence
  • Evidence Reconstruction

Module 8 – Investigating Web Attacks

  • Web Attack Investigation
  • Investigating Web Server Logs
  • Tools for Locating IP Address

Module 9 – Database Forensics

  • MSSQL Forensics
  • MySQL Forensics

Module 10  – Cloud Forensics

  • Usage of Cloud Forensics
  • Stakeholders and their Roles
  • Investigating Cloud Storage Services

Module 11 – Malware Forensics

  • Malware Analysis: Static
  • Malware Analysis: Dynamic
  • Analysis of Malicious Documents
  • Malware Analysis Challenges

Module 12 – Investigating Email Crimes

  • Email System
  • Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
  • Steps to Investigate Email Crimes and Violation
  • Examine E-mail Messages
  • Laws and Acts against Email Crimes

Module 13 – Mobile Phone Forensics

  • Mobile Forensics Process
  • Forensics Imaging
  • Platform Security Removal Techniques: Jailbreaking/Rooting
  • Android Forensics Analysis

Module 14 – IoT Forensics

  • Forensics of IoT Device
  • Wearable Device Forensics

Module 15 – Dark Web Forensics

  • What is Deep Web & Dark Web
  • How Tor works
  • Forensics of System where tor has been installed
General Information
  • Please ensure to use a secure internet connection.
  • Please ensure to check your details before submitting.
  • The discounts are applicable only on full payment.
  • You can use only one discount for a course in a particular program it can be either of the discounts as per the discount validity.
  • Ensure to use the proper discount code.
  • Gateway charges are as applicable.
  • In case of any transaction issue, please inform us by mailing at [email protected] or call us at 9335469335
  • Please ensure to note down your order id and transaction id at the time of communication with us.
  • All the payments are subject to realization.

Enquire Now