Digital Forensics

Gate all update news here

Digital Forensics

Digital Forensics is a 30 hours comprehensive program offered by ICSS. Students will learn about various important concepts about Computer Forensics, Cybercrime & Digital Evidence; Forensics Investigation Phases; Forensics Investigation Methodology; Evidence Handling; Email Investigation; and Database Forensics. This course also focuses on legal considerations applicable to computer forensics and how to identify, collect and preserve digital evidence. The student will learn how to identify, collect and preserve digital evidence. The student will also understand scientific principles relating to digital forensics and various concepts like keyword lists, grep, file hashing, and report writing. The students will also get hands-on lab experience using various opensource tools.

Digital Forensics Course Modules

    M 1 – Introduction to Computer Forensics
  • 1.1 : Overview
  • 1.2 : Objectives of Computer Forensics
  • 1.3 : Branches of Digital Forensics
  • 1.4 : Digital Forensics Process
  • 1.5 : Cyber Cells & IT Law in India
  • 1.6 : IT Act 2000 – Penalties and Offences
  • M 2 – Cybercrime & Digital Evidence
  • 2.1 : Overview
  • 2.2 : Challenges in Forensics Investigation
  • 2.3 : Principles & Rules of Forensics Investigation (include Locard’s Exchange principle)
  • 2.4 : Digital Evidences
  • 2.5 : Characteristics of Digital Evidence
  • 2.6 : Rules of Evidence
  • 2.7 : Sources of Evidence
  • 2.8 : Gathering Digital Evidence: The Procedure
  • 2.9 : Volatile Evidence
  • LAB-1 CAPTURING THE VOLATILE MEMORY
  • 2.10 : Non-volatile data
  • LAB-2 ACQUIRING NON-VOLATILE DATA
  • 2.11 : Chain of Custody
  • 2.12 : Importance of Digital Evidence in the Court of Law
  • M 3 – Forensics Investigation Phases
  • 3.1 : Overview
  • 3.2 : Pre investigation
  • 3.3 : Investigation
  • 3.4 : Post investigation
  • M 4 – Forensics Investigation Methodology
  • 4.1 : Secure Crime Scene and Shreds of evidence
  • 4.2 : Photography and Videography of Evidence
  • 4.3 : Sketching and Crime Scene Checklist
  • 4.4 : Search, Collect & Seize Digital Evidences
  • 4.5 : Data Acquisition
  • 4.6 : Storage Formats for Digital Evidence
  • 4.7 : Data Acquisition and Duplication Tools
  • 4.8 : Data Acquisition Best Practices
  • 4.9 : Forensics Investigation Report
  • 4.10 : Examination & Analysis
  • 4.11 : Report writing
  • 4.12 : Courtroom presentation / Expert Witness
  • M 5 – Evidence Handling
  • 5.1 : Overview
  • 5.2 : Investigation of Powered on and powered off computer/device
  • 5.3 : Computers, Components, and Devices
  • 5.4 : Fundamentals of Hard Disk and File System
  • 5.5 : File systems (Windows/Linux/Mac file system)
  • M 6 – Email Investigation
  • 6.1 : Overview
  • 6.2 : How Does Email Work?
  • 6.3 : Email Identities and Data
  • 6.4 : E-Mail Forensics Investigation Techniques
  • 6.5 : IP & IP location
  • 6.6 : Traceroute
  • 6.7 : E-Mail Forensics Tools
  • M 7 – Database Forensics
  • 7.1 : Overview
  • 7.2 : Importance of Database Forensics
  • 7.3 : Database Artifact for Forensics Analysis
  • 7.4 : MSSQL Forensics
  • 7.5 : Data Store in SQL Server
  • 7.6 : Challenges of Database Forensics
  • 7.7 : Computer Forensics Tools and Techniques

BOOK YOUR DEMO NOW

What are you waiting for?

Pick up your phone & register your seat for Cyber Security & Ethical Hacking Training & Certification courses. If you still have any kind of doubts feel free to contact our counselor.

Program Details​

  • Helps to recover, analyze, and preserve computer and related materials in such a manner that it helps the investigation agency to present them as evidence in a court of law.
  • Helps to postulate the motive behind the crime and identity of the main culprit.
  • Designing procedures at a suspected crime scene which helps you to ensure that the digital evidence obtained is not corrupted
  • Data acquisition and duplication: Recovering deleted files and deleted partitions from digital media to extract the evidence and validate them
  • Helps you to identify the evidence quickly, and also allows you to estimate the potential impact of the malicious activity on the victim
  • Producing a computer forensics report which offers a complete report on the investigation process.
  • Preserving the evidence by following the chain of custody

Copyright © 2022 by ICSS. All Rights Reserved.