Skill Building & Career Launch Program (03 Months)
| Day | Session | Topic |
|---|---|---|
| 1 | Session 1 |
· Understand the Fundamentals of Computer Forensics · Understand Cybercrimes and their Investigation Procedures |
| Session 2 |
· Understand Digital Evidence · Understand Forensic Readiness, Incident Response and the Role of SOC |
|
| Session 3 |
· Identify Roles and Responsibilities of a Forensic Investigator · Challenges in Investigating Cybercrimes |
|
| 2 | Session 4 | Understanding Legal Compliance in Computer Forensics |
| Session 5 | Seizure of Forensic Evidence – Hands-on Practical | |
| Session 6 | Seizure of Forensic Evidence – Hands-on Practical | |
| 3 | Session 7 | Understanding the Forensic Investigation Process and its Importance |
| Session 8 |
· Pre-investigation Phase · First Response |
|
| Session 9 |
· Investigation Phase · Post-investigation Phase |
|
| 4 | Session 10 |
· Types of Disk Drives and their Characteristics · Logical Structure of Disk |
| Session 11 | Booting Process of Windows, Linux and Mac Operating Systems | |
| Session 12 | File Systems of Windows, Linux and Mac Operating Systems | |
| 5 | Session 13 | Examination of File System using Autopsy & Sleuth Kit |
| Session 14 |
· Storage Systems · Encoding Standards and Hex Editors |
|
| Session 15 | Analysis of File Formats using Hex Editors | |
| 6 | Session 16 | Data Acquisition Fundamentals |
| Session 17 | Data Acquisition Methodology | |
| Session 18 | Preparing Image File for Examination | |
| 7 | Session 19 |
· Anti-forensics Techniques · Data Deletion and Recycle Bin Forensics |
| Session 20 | File Carving and Recovery from Deleted Partitions | |
| Session 21 | Password Cracking / Bypassing Techniques | |
| 8 | Session 22 |
· Steganography · Hidden Data Detection · Trail Obfuscation and File Extension Mismatch |
| Session 23 |
· Artifact Wiping · Metadata Overwrite Detection · Encryption |
|
| Session 24 |
· Program Packers · Anti-forensics Countermeasures |
|
| 9 | Session 25 | Assessment / Practical Test |
| Session 26 | Assessment / Practical Test | |
| Session 27 | Query Session | |
| 10 | Session 28 | Understanding of Windows Forensics |
| Session 29 | Collect Volatile and Non-Volatile Information | |
| 11 | Session 30 | Windows Memory and Registry Analysis |
| Session 31 |
· Password Cracking · Shell Bags · LNK Files · Event Logs |
|
| 12 | Session 32 | Volatile and Non-Volatile Data in Linux |
| Session 33 | File System Analysis using Sleuth Kit | |
| 13 | Session 34 | Memory Forensics Demonstration |
| Session 35 | Memory Forensics using Volatility and PhotoRec | |
| 14 | Session 36 |
· MAC Forensics · Network Forensics |
| Session 37 |
· Logging Fundamentals · Indicators of Compromise (IoCs) · Network Traffic Investigation |
|
| 15 | Session 38 | Database Forensics and its Importance |
| Session 39 |
· Servers Overview · Evidence Collection and Database Forensics |
|
| 16 | Session 40 | Cloud Forensics Fundamentals |
| Session 41 |
· Microsoft Azure Fundamentals · Amazon Web Services (AWS) Fundamentals |
|
| 17 | Session 42 |
· E-mail Forensics · Crimes Against E-mails |
| Session 43 | Performing E-mail Forensics | |
| 18 | Session 44 | Importance of Mobile Device Forensics |
| Session 45 |
· Android and iOS Architecture · Steps Involved in Mobile Forensics |
|
| 19 | Session 46 | SIM File System and Acquisition Methods |
| Session 47 |
· Phone Locks · Rooting of Android and Jailbreaking of iOS |
|
| 20 | Session 48 | Mobile Forensic Challenges and Report Preparation |
| Session 49 | IoT Forensics | |
| 21 | Session 50 | Theory and Practical Test |
| Session 51 | Query Session | |
| 22 | Session 52 | Theoretical Project Allotment and Work |
| Session 53 | Theoretical Project Work and Presentation | |
| 23 | Lab 1 | Demonstration of Tableau TX1 |
| 24 | Lab 2 | Hands-on Practical of Tableau TX1 |
| 25 | Lab 3 | Hands-on Practical of Tableau TX1 |
| 26 | Lab 4 | Hands-on Practical of Tableau TX1 |
| 27 | Lab 5 | Hands-on Practical of Tableau TX1 |
| 28 | Lab 6 | Demonstration of FTK Imager |
| 29 | Lab 7 | Hands-on Practical of FTK Imager |
| 30 | Lab 8 | Hands-on Practical of FTK Imager |
| 31 | Lab 9 | Hands-on Practical of FTK Imager |
| 32 | Lab 10 | Hands-on Practical of FTK Imager |
| 33 | Lab 11 | Demonstration of FTK Toolkit |
| 34 | Lab 12 | Hands-on Practical of FTK Toolkit |
| 35 | Lab 13 | Hands-on Practical of FTK Toolkit |
| 36 | Lab 14 | Hands-on Practical of FTK Toolkit |
| 37 | Lab 15 | Hands-on Practical of FTK Toolkit |
| 38 | Lab 16 | Demonstration of Magnet Process |
| 39 | Lab 17 | Hands-on Practical of Magnet Process |
| 40 | Lab 18 | Hands-on Practical of Magnet Process |
| 41 | Lab 19 | Hands-on Practical of Magnet Process |
| 42 | Lab 20 | Hands-on Practical of Magnet Process |
| 43 | Lab 21 | Demonstration of Magnet Examine |
| 44 | Lab 22 | Hands-on Practical of Magnet Examine |
| 45 | Lab 23 | Hands-on Practical of Magnet Examine |
| 46 | Lab 24 | Hands-on Practical of Magnet Examine |
| 47 | Lab 25 | Hands-on Practical of Magnet Examine |
| 48 | Project | Project Work Allotment |
| 49 | Project | Project Work / Report Preparation |
| 50 | Project | Project Work / Report Preparation |
| 51 | Project | Project Work / Report Preparation |
| 52 | Project | Project Work / Report Preparation |
| 53 | Lab 26 | Demonstration of UFED 4 PC |
| 54 | Lab 27 | Hands-on Practical of UFED 4 PC |
| 55 | Lab 28 | Hands-on Practical of UFED 4 PC |
| 56 | Lab 29 | Hands-on Practical of UFED 4 PC |
| 57 | Lab 30 | Hands-on Practical of UFED 4 PC |
| 58 | Project | Project Allotment & Working |
| 59 | Lab 31 | Demonstration of UFED PA |
| 60 | Lab 32 | Hands-on Practical of UFED PA |
| 61 | Lab 33 | Hands-on Practical of UFED PA |
| 62 | Lab 34 | Hands-on Practical of UFED PA |
| 63 | Lab 35 | Hands-on Practical of UFED PA |
| 66 | Presentation | Final Presentation and Awarding of Certificate |