Computer Forensics & Cyber Crime Investigation : Using Open Source Tools

DESCRIPTION

Are you eager to learn Computer Forensics and Cyber Crime Investigation and want to be a profound Forensics Investigator? If your answer is YES, then this course is only for you. I specially framed this course to Transform Your Life from what you are today to what you actually want to be. 

I personally worked on more than 3,000 Cyber Crime Cases as Investigator and currently helping INDIAN law enforcement agencies to fight against cybercriminals. Computer crime in today’s cyber world is on the rise. Computer Forensics Investigation techniques are being used by Police, Government and Corporate entities globally to solve any case related to computer or Digital devices. 

Instructor: Gautam Kumawat

He is a Passionate, Security Enthusiast, Cyber Crime Investigator, Digital Forensics Expert, Professional Hacker, Security Researcher and Law Enforcement Agencies Trainer. I am also working part-time for Rajasthan Police (Cyber Crime Cell).

This course can help prevailing as well as new professionals to develop an existing and a new career respectively. Computer Forensic Investigator is one of the most valued certificates in Network Security and possessing it raises one to an elite group of professionals. 

You Will Be Having Knowledge of These Topics After Completing This Course : 

  •  Investigation process in Computer Forensics.
  • Legal issues involved in Digital Forensics investigations. 
  • Searching evidence and digital footprints on Criminal Computer.
  • Use of Kali Linux in Computer Forensics. 
  • Methodologies of Acquisition and seizing Digital devices.
  • Digital evidence, their types, examination processes.
  • Electronic crime and their categories.
  • Setting up a forensic lab in the computer.
  • Knowledge of Windows forensics.
  • Volatile and non-volatile information gatherings 
  • Forensics analysis of RAM Dump 
  • Recover deleted files and hard disk partitions 
  • Steganography, Steganalysis.
  • Concepts of password cracking and investigating password attacks.
  • Generating investigative reports.
  • Multimedia Forensics .
  • Anti-Forensics Techniques used by Hackers to erase evidence. 

BONUS: Cyber Crime Investigation of Website Hacking, Social Media Crime & Email Crime Investigation. 

By the conclusion of this computer based tutorial for Computer Forensics and Cyber Crime Investigation, you will have a clear understanding of what it takes to be a computer forensics investigator, and the tools and techniques used by most Forensics Science Laboratories in solving Computer related crimes. 

Have a Joyful Journey of Learning! - Gautam Kumawat

CONTENT
  • 1. Introduction To Computer Forensics Or Digital Forensics SAMPLE
  • Computer/ Digital Forensics PDF
  • 1. The process of Digital Forensics Investigation
  • 2. Maintaining Chain Of Custody
  • Best Practices For Seizing Electronic Evidence
  • 2. Write-Blockers
  • 2. Maintaining Integrity
  • 3. Imaging/Acquisition of Operating System: FTK Imager
  • 3. Create Forensics Image of HardDisk, Pendrive or any Storage Device
  • 4. Computer Forensics Lab Setup - Installing Kali Linux Stable Version
  • 4. Computer Forensics Lab Setup: Installing Kali Linux Live
  • 5. Digital Forensics Investigation: Analysis of Acquired Image
  • 5. Hashing and Data Fingerprinting In Digital Forensics
  • 5. Windows Forensics Analysis Part - 1
  • 5. Windows Forensics Analysis Part -2
  • 5. Windows Forensics Analysis Part -3
  • 5. Dump Analysis Using Bulk Extractor
  • 5. Dump Analysis Using Foremost
  • 6. Finding Browsing History, Bookmarks and lot of Evidence
  • 7. Multimedia Forensics - Introduction to Steganography
  • 7. Steganography Using Tool
  • 7. Steganography Without Using Tool
  • 7. Image Forensics
  • 8. Tacking RAM Dump & Volatile Memory Analysis: How to Dump Ram Memory
  • 8. Analysis of RAM Dump
  • 9. Anti-Forensics Techniques & Detection: What is Anti-Forensics
  • 9. Anti-Forensics Technique - 1
  • 9. Anti-Forensics Technique - 2
  • 9. Anti-Forensics Technique - 3
  • 10. BONUS: Cyber Crime Investigation - Website Crime Investigation
COMPLETION RULES
  • All units must be completed
  • Leads to a certification with a duration: Forever