Forensics Trainings

Courses Description Duration
Computer Hacking Forensic Investigator (CHFIv9)
…Log Analysis • Incident Response…Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • Cloud Forensics • Malware Forensics Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act • Investigating email crime • Mobile forensics • Forensics report writing and presentation. 5 days
Certified Professional Forensics Analyst (CPFA)
…Log Analysis • Incident Response…• 6 A’s of Digital Forensics • Chain of Custody • Evidence Acquisition • Evidence Preservation • Dead v/s Live Forensics • Disc Based Forensics • Forensics Imaging • EnCase Forensics • Windows Live Response • Linux Live Response • Network Forensics • Packet Analysis • Digital Forensics • Browser Forensics • Registry Forensics • Sysinternals • Memory Analysis • IT Act 4 days
Certified Digital Forensics Expert (CDFE)
…Mobile Forensics • Forensics Imagine…• Mobile Forensics • Forensics Imagine • Forensic Analysis of the evidence • Introduction to Forensics • History of Forensics • How to approach to crime scene • Computer Investigation Process • Forensic Imaging of the evidence • Forensic Analysis of the evidence • Steganography • Email Crimes • Investigating attacks • Investigating Network & log • Forensic Report Writing • Types of investigation • Becoming an Expert witness 5 days
Intrusion Detection and Analysis
…SOC Best Practices • Indian IT Act…• Wireshark • Security Information Management • OSSIM • Portscan Signature Detection • DNS Attack • RPC Buffer Overflow • SQL Injection • Incident Analysis • Concept of 6 A’s • Packet/Protocol Analysis • TCP/IP 3 days
Course for Law Enforcement
…Digital Forensics • Legal Challenges…• Tools for audit and investigation • Computer Based Fraud & Implications • Fraud Case Studies • Financial Fraud Investigation Technique 2 days
Fraud Detection, Investigation and Prevention
…Inverse Logic • Tiger Team Test…• Benford’s Theorem • Barium Test • Birbal Tricks and Traps • Accounting Fraud • Space-time dimension in data evaluation • surprise repetition in audit tests • CAAT • Evidence Collection • File Recovery • Email Tracing • Internet History • Data Dump Analysis • Transaction Log 2 days
E-Crime and Computer Forensics
…Stuxnet • Chain of custody …• Dead Forensics • IT Act • Incident Response • Evidence Collection • Disc Based Forensics • Network Forensics • Log Analysis • EnCase • Live Forensics 4 days

Leave a Reply

Your email address will not be published. Required fields are marked *

Other Menu
This is the official Menu of GFSoft.download