Training
Cyber Crime Investigation In Ahmedabad| Gandhinagar | Vadodara| Rajkot
Cyber Crime Investigation In Ahmedabad| Gandhinagar | Vadodara| Rajkot
Course Name : Cyber Crime Investigator
Fees & Duration (Online Mode)
Fees: 25000/- Per candidate
Saturday, Sunday On-Line Mode
Duration: 2 Hours
Fees & Duration (Fast Track Mode)
Fees: Ask me/- Per candidate
Saturday, Sunday
Duration: 4 Day For 8 Hours
Study Material
Selected/Tested Tool & Material
Basic Skill Requirement
Basic Knowledge hacking
knowledge of windows, Basic Linux
Knowledge of Hardware & Networking
Knowledge about Internet & Browser
Module 1) Understanding Cyber Crime
What is Cyber Crime & Laws?
Types of Cyber Crime
What Is Ethical Hacking?
Module 2) Computer Forensics
What is Computer Forensics??
Reasons for Evidence
Type of Evidence
Who Uses Computer Forensics?
Evidence Processing Guidelines
Collecting Evidence
Module 3) Window Password Forensic
System Password Security
System Password lookup
Admin Password Security
Admin Password lookup
Reset System Password
Reset Admin Password
Windows Export Tool
Module 4) Forensics with “Winhex Tool”
What Is Winhex
Why Using Winhex
Calculate Hash for Disk using MD5
Forensic Disk Imaging
Calculate Hash Digest for the image
Data Acquisition on a live System
Searching for Evidence
Recovering Delete Evidence
File Recovery by Type
Ram Memory Evidence
Ram Memory Investigation
Module 5) Forensics with Forensic Toolkit-FTK
What Is Forensic Toolkit-FTK
Create Case Name
Searching Evidence
Delete File Finding
Duplicate Item Finding
Encrypt File Finding
Mail ID Finding
Document Finding
Recovering Delete Evidence
Ram Memory Evidence
Ram Memory Investigation
Module 6) Forensic With Autopsy
Automated, intuitive workflow
hard drives and smart phones forensic
Extracts artifacts from web browsers
MD5 hash lookup
Indexed keyword search
Deleted file carving
EXIF data extraction from JPEG images
Geo location from JPEG files.
Timeline analysis for all events
Standard Android database parsing
Extension mismatch detection
Image gallery for picture review
Email message extraction
Report Formats: HTML, CSV,
Module 7) Data Forensics & Recovery
Introduction to Data Forensics
What Is Data Recovery
Type of Data Recovery
Hard disk Data Recovery
Portable Media Data Recovery
CD/DVD Data Recovery
What Is Anti- Forensics
Why Using Anti Forensics System
Live Disk & Backup System
Disk Cloning
Resource for data forensics
Module 8) File Security & Recovery
Word, Excel Password Security
Word, Excel Password Recovery
Advanced PDF Security
PDF Password Recovery
ZIP, RAR File Security
ZIP, RAR File Password Recovery
Online Password Recovery
File & Folder Security
Different Type of Folder Hidden Trick
Module 9) Windows Forensics & Anti Forensic
Login Log Investigation
Last Activity Investigation
File & Folder Investigation
Window Log & Login Investigation
OS Forensics System
Last changed & Opened File
USB Forensics
Investigation With Live Disk
Basic Anti Forensics & Tool
VMware Workstation with (Anti – forensic)
Deep Freeze (Anti -Forensics)
Module 10 Android Mobile Forensics
What Is Android
Root Android Devices
Android Forensics Tool
Android Data Recovery
Deleted Call History
Deleted Text Massage
Deleted Contact
Deleted Any Media
Module 11 IP Tracing & Reporting
What Is IP(IPv4 & IPv6)
IP Tracing (IPv4 & IPv6)
IP CDR Data Investigation
Latter Base reporting( F.I.R & Any Other Latter )
Module 12)Social Media Investigation
What Is Social Media
Introduction To Social Media Crime
Fake ID Detection
Permanently Delete Evidence
Victim IP address Finding All Location
Social Media Account User Activity Finding
Fact Problem of Fake Profile Cases
Latter Base reporting (F.I.R & Any Other Latter)
Module 13) Whatsapp tracking & Investigation
Introduction to Whatsapp
Introduction to Whatsapp Crime
WhatsApp Data Collecting
Whatsapp Data Analyst
IP tracking & Reporting
The legal method of WhatsApp data tracking
Latter Base reporting( F.I.R & Any Other Latter )
Module 14) Browser Investigation & Security
What Is Browser
Browser Spoofing & Detection
Browser Password Decrypted
Browser Investigation
Browser Password Forensic
Module 15) Email Investigation & Security
Introduction to Email Working System
Introduction to Email related Crime
Introduction to header File & Analyst
Login IP Finding & Tracking
Mail Bombing & Spoofing attack
Mail Verification/ verify
Any Email Investigation Common Point
Investigation Free Email Technique (Ex. Gmail , Yahoo Mail)
Investigation Commercial Email Account Technique
Latter Base reporting( F.I.R & Any Other Latter )
Module 16) VPN- Proxy and Tor Browser Investigation
What Is VPN
Setup VPN Security
VPN Investigation Guideline
What Is Proxy
Proxy Investigation Guideline
What Is Tor Browser
Tor Bowser Investigation
Module 17) Person Tracking (Base on Gujarat) (note: This module practical & logically)
Introduction to Document
Types of Document
Document Verification
Person Finding Method
Person & Family Finding
Example Of Love marriage case,
Example Of check bounce case
Non-social media user Finding
Fraud Company & Director Verification
Module 18) Child Pornography Investigation
Step by step Investigation
Reporting to anti-child porn Organization
All Type child crime report
Module 19) Virus Programming & Security
What Is Virus
Virus Maker Tool
Basic Virus Programming
Create Different Virus
What Is Anti- Virus
Antivirus Security Setup
Windows Protection System Setup
Anti – Malware Protection
Reset Network & System
Module 20) Mobile Spyware & Key-logger
What Is key logger
Type of Key logger
Mobile Spyware attack
Protection Against spyware
Remove Spyware Without Any Tool
Module 21) Domain security & Investigation
What Is Domain
Introduction to Domain
How to Purchase Web Hosting
Domain Privacy
Add-on Base Security
Domain Investigation without Tool
Domain Investigation With To0l
Fraud Domain Reporting
Introduction to Fake website
History of Fake Site
Web Investigation Step By step
Reporting to Fake Site
Porn site Repotting
Latter Base reporting( F.I.R & Any Other Latter )
Module 22) Web Hosting Security & investigation (Linux hosting)
What Hosting
Introduction to Hosting Panel
How to Purchase Web Hosting
How to Choice Secure Hosting Panel
cPanel Security
Coding Base Secure Hosting Panel
Dedicated IP Security
Share Hosting Weak Point
Hosting Server Investigation
Hosting Panel Investigation Step By Step
Website Backup System
Hacker link Remove from Website
Hacked website Recovery
Hacked Website Investigation
Website Backup System
Website Sensitive Information Remove from Google
Website Sensitive Information Protection
Latter Base reporting( F.I.R & Any Other Latter )
Module 23) WordPress Vulnerability & Security (Only Developer)
What is WordPress
Why Using WordPress
WordPress Installation & Setup
WordPress Vulnerability
WordPress Themes Vulnerability
WordPress Plug-in Vulnerability
Different type attack on WordPress site
WordPress Backup
WordPress Security
WordPress Investigation
Module 24) WordPress/Joomla/ Drupal Security (Without Plug-in tool) (Only Developer)
XMLRPC Attack Protection
File injection attack Protection
TRACE & TRACK Blocking
No web server version and indexes
Pingback Vulnerability
Brute Force Attacks
File Protection
Login Page Protection
SQL Injection
Weak Directory Protection
Module 25) CDR Investigation (Only For Police Department)
Personal CDR Investigation
IMEI CDR Investigation
Site (Dumps) CDR Investigation
IP CDR Investigation
Reporting CDR Provider Officer
What Cell ID
Structure CDR, IP CDR, IMEI CDR, Cell ID,
Mobile Location Tracing IN India
Latter Base reporting (F.I.R & Other Latter)
Secret of Undetected Location & IMEI Number In CDR Data
Call Spoofing/fake
Call & SMS blasting & Protection
Caller number verification Method
Mobile Data Hacking with Script