Technical Diploma Course by NIELIT

Certificate Course in Cyber Forensic


  12769+ Satisfied learners

  Read review

Certificate Course in Cyber Forensic course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations.


Students Enrolled


Mode of Training

500 Hours

Course Duration

No Cost EMI

Easy EMI Option

Career in IT Security

Why Cyber Forensics as a Career?

Information Technology Act, 2000 (IT Act 2000) was a landmark piece of legislation for India as it provided the base for Indian cyber law and matters related to the same. With gradual developments and amendments, issues pertaining to cyber crimes, cyber forensics, electronic evidences, cyber security, etc were also incorporated into the IT Act 2000. Although the need for a comprehensive and holistic techno legal framework is still haunting Indian government yet there is no escape from the conclusion that Indian cyber law must also be repealed and replaced by a better piece of legislation. At the same time Indian law enforcement agencies must be suitably trained in the matters of cyber law, cyber crimes investigation, cyber forensics, etc. This career will grow at a rate of at least 22 percent (the projected rate of growth for private investigator jobs) and probably higher than 27 percent (the projected rate of growth of computer-support-related jobs) through 2018.

On the other hand, cyber crimes have significantly increased in India. The trends in this regard are not very promising. For instance, the cyber law (PDF), cyber security (PDF) and cyber forensics (PDF) trends in the year 2013 have showed poor performance of Indian government in these fields. This position has not changed in 2014 as well. For instance, the cyber forensics trends of India 2014 still show inability of India to deal with cyber forensics related issues



Program by Ministry of EIT

Cyber Forensic Curriculum

Unit 1 :  Categorization of Cyber Crimes, security policy violations, online financial frauds, elaboration of cybercrimes
Unit 2 :  Explain Indian IT (Amendment) Act 2008, Objective, Applicability, and Jurisdiction;
Unit 3 :  Explain the basics of Architecture.Importance of File systems Windows file structure
Unit 4 :  Can perform Data Hiding Techniques, Swap Files, Slack space, Unallocated and Allocated space, ADS
Unit 5 : Use and working with optical, magnetic, semiconductor, etc. and their interfaces with a computer system, Hard DisksIDE, SATA, SCSI; CD/DVD
Unit 6 : Perform Swap Files, Slack space, Unallocated and allocated space, alternative data streams (ADS)
Unit 7 : Need of computer forensic investigation of the cyber crimes, forensic investigation process, identification, seizing, imaging and analysis of digital evidence, report preparation

Unit 1:  Handling of digital evidence at the site of the crime and basic rules of digital evidence; safe & secure packing and transportation of digital evidence
Unit 2 :  Explain Volatile data, order of volatility, importance of volatile data etc. Collecting Volatile Data, acquisition of RAM data. Use of tools to capture, steps to image the volatile data (RAM) and other volatile data from a live system
Unit 3 :  Use of Disk imaging software tools & hardware equipment, Dead & Live Acquisition of digital evidence, imaging of virtual systems
Unit 4 :  Use of Disk imaging software tools & hardware equipment, Dead & Live Acquisition of digital evidence, imaging of virtual systems

Unit 1 :  Recovery of Deleted files, recovery of data from the hard disk, damaged FAT, using of file carving tools.
Unit 2 : Explain Methodology of analysis, preparation & updation of the list of relevant keywords, their search.
Unit 3 :  Analysis of media files headers, manual of graphics, audio, video files; Steganography in media files, the process of hiding of data/data files in media files.
Unit 4 :  Role of logs in forensic analysis, access logs from various sources, log analysis tools, analysis of logs using log analysis tools and manually.
Unit 5 :  Preparation of Computer Forensic Analysis Reports, Executive Summary, Goals/Objective of the Analysis, case questionnaires with relevant findings, referring to annexing of supporting documents, screenshots, photographs; tools used, forensic analysts involved, Report writing Guidelines, organizing the Reports, Documenting Investigative Steps with sections& subsections, Conclusion, Expert witness, testimony by a forensic analyst and role of an expert witness in judicial courts.

Unit 1 :  Examination of recycle bin windows shortcut files, swap file pagefile.sys, hibernation file, print spool files, windows registry analysis, registry analysis tools, registry hives, knowing about USB devices used,
Unit 2 :  Use of built-in command-line tools for computer forensic investigation , data recovery tools 
Unit 3 :  Analysis of websites in favorites, history, cookies, temporary internet files, data in cache, saved passwords, auto-complete feature, internet usage analysis tools 
Unit 4 :  Can perform following tasks: recovery of deleted e-mails, e-mail headers, viewing & analysing the e-mail headers in popular e-mail software applications, and forensic toolkits in tracing e-mails
Unit 5 :  Handling challenges or bottlenecks in computer forensic investigation for a computer forensic analyst; encrypted, compressed, password protected documents

Unit 1 :  Communication with colleagues, Clients, superiors.
Unit 2 : Managing career, staff and professional relationships
Unit 3 :  Ready for interview

course Details

Network Specialist NS
Technical Diploma Course
Qualification Code: NIELIT/IT/L6/024
NSQF Level: Level-6
Volume of training: 500 Hours

Entry requirements / recommendations.

Graduate in Science/ Engineering Stream pursuing 

Occupation(s) to which the qualification gives access

  • Computer Forensics Technician
  • Junior Forensics Analyst
  • Senior Forensics Analyst
  • Senior Forensics Manager
  • Computer Forensics Engineer
  • Computer Forensics
  • Investigator
  • Computer Forensics Specialist
  • Computer Forensics Analyst
  • Computer Forensics Examiner


  • Get certified by best institute
  • Live and interactive session over zoom call
  • Practical exposure from the best mentors
  • Good knowledge in hacking and cyber security
  • Small batch size to focus on every student
  • Provide “think like hacker” approach in the participants

What To Do Next

Progression from the qualification.

Initially, candidate can work as Junior Forensics Analyst who would be capable of recovering information from computers and storage devices. The trained candidate may assist to law enforcement officers with cyber crimes and to retrieve evidence. Computer forensics analysts uncover digital data (such as e-mail correspondence or erased files), preserve it for later use as evidence, and analyze the data in light of the crime in question. For example, they may have to determine how hackers or unauthorized personnel gained access to information or computer systems as well as where and how they navigated within the system.

Still Having Doubt

Enquire With Us Now

Registration Form

Hurry Up! Reserve your seat today

Registration Form

Hurry Up! Reserve your seat today

Registration Form

Hurry Up! Reserve your seat today


Your Information and data is 100% secure and private