10

Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

  • Upload
    others

  • View
    25

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation
Page 2: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

Course Outline of Cyber Forensics Investigation

❑ What is Computer Forensics❑ Methods By Which Computer Gets Hacked❑ Computer Forensics Investigation Process❑ Digital Evidence Gathering ❑ Computer Forensics Lab ❑ setting up Forensics Lab ❑ Understanding Hard Disks ❑ File Systems analysis : Linux/Windows/Mac❑ windows File System Forensics❑ Data Acquisition Tools and Techniques ❑ Data Imaging Techniques and Tools ❑ Recovery Deleted Files and Folders ❑ Deleted Pratitions Recovery Technique ❑ Forensics Investigations Using Forensics

Toolkit (FTK)

❑ Forensics Investigations Using Forensics Toolkit (OXYGEN)

❑ Forensics Investigations Using Encase Tool ❑ Stenography and Image File Forensics ❑ Application Password Crackers❑ Log Computing and Event Correlation❑ Network Forensics Tools : Cellebrite Tools❑ Investigating Tools❑ Investigating Network Traffic : Wireshark❑ Investigating Wireless Attacks ❑ Investigating Web Application Attacks Via

Logs ❑ Tracking and Investigating Various Email

Crimes ❑ Detailed Investigative Reporting

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in

Page 3: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

BENEFITS OFTRAINING

Training Certificate

Toolkit/ Software

Campus Ambassador

Workshop Passes

Goodies/ Gifts Exam1 Years

Membership

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in

Page 4: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

www.craw.inEmail:[email protected]

BATCH OPTIONS

WEEKDAY CLASSES

Monday to Friday

Duration : 2-3 Hours

Number of classes:40-50Hours(Instructor-Led Training)

WEEKEND CLASSES

Every Sunday and Saturday

Duration : 4 to 8hours.

Number of classes : (40-50Hours)

Regular Batch

Monday To FridayBatch

Timings

10:00 -12:00

1:00 –3:00

3:00 –5:00

5:00 –7:00

AlternateDays

Mon-Wed-Fri Tue-Thu-Sat

Batch Timings:

10:00 -12:00

1:00 –3:00

3:00 –5:00

5:00 –7:00

Weekend

Sat-Sun

BatchTimings:

10:00 -01:00

1:00 –4:00

4:00 –7:00

Sunday Only

BatchTimings:

9:00 -01:00

1:00 –5:00

5:00 –8:00

Call Us: +91-9650202445 | +919650677445

Page 5: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

TARGETAUDIENCEIndividuals▪ School Students▪ College Students▪ IT Professionals▪ IT Officers▪ IT and LAW

Officers

Corporate▪ IT Training Firms/Organizations/Society▪ IT Consultants▪ IT Experts▪ IT Officers▪ IT Institutions & Colleges▪ IT Graduated or Computer Science

Students

GovernanceSecurity Agencies | Security Groups | Govt. IT Institutions | IT Govt. & Security Officers.

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in

Page 6: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

Instructor-led training provides a comfortable teaching environment with instructors that are familiar

with the certification process and can help you master your certification exam. Find your instructor

now. There’s a wealth of training materials available that match your learning needs and learning style.

Whether you are studying on your own, or in a classroom environment, we recommend EC-Council and

CISCO Authorized Quality Curriculum training materials that will help you get ready for your

certification exam and pass the test

Classroom Training

Page 7: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

TAKE A CAMPUS TOUR

Page 8: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

TAKE A CAMPUSTOUR

Page 9: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

CONTACTUS

CRAWSECURITY

011-40394315 | +91-9650202445 | [email protected]

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate,Westend Marg, Behind Saket Metro Station,

New Delhi - 110030

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in

Page 10: Course Outline of Cyber Forensics InvestigationCourse Outline of Cyber Forensics Investigation What is Computer Forensics Methods By Which Computer Gets Hacked Computer Forensics Investigation

THANKYOU

Call Us: +91-9650202445 | +919650677445 Official Web: www.craw.in