Training

Cyber Crime Investigation In Ahmedabad| Gandhinagar | Vadodara| Rajkot

Course Name : Cyber Crime Investigator

Fees & Duration (Online Mode)

Fees: 25000/- Per candidate

Saturday, Sunday On-Line Mode

Duration: 2 Hours

Fees & Duration (Fast Track Mode)

Fees: Ask me/- Per candidate

Saturday, Sunday

Duration: 4 Day For 8 Hours

Study Material

Selected/Tested Tool & Material

Basic Skill Requirement

Basic Knowledge hacking

knowledge of windows, Basic Linux

Knowledge of Hardware & Networking

Knowledge about Internet & Browser

Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 1) Understanding Cyber Crime

  • What is Cyber Crime & Laws?

  • Types of Cyber Crime

  • What Is Ethical Hacking?


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 2) Computer Forensics

  • What is Computer Forensics??

  • Reasons for Evidence

  • Type of Evidence

  • Who Uses Computer Forensics?

  • Evidence Processing Guidelines

  • Collecting Evidence


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 3) Window Password Forensic

  • System Password Security

  • System Password lookup

  • Admin Password Security

  • Admin Password lookup

  • Reset System Password

  • Reset Admin Password

  • Windows Export Tool


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 4) Forensics with “Winhex Tool”

  • What Is Winhex

  • Why Using Winhex

  • Calculate Hash for Disk using MD5

  • Forensic Disk Imaging

  • Calculate Hash Digest for the image

  • Data Acquisition on a live System

  • Searching for Evidence

  • Recovering Delete Evidence

  • File Recovery by Type

  • Ram Memory Evidence

  • Ram Memory Investigation

Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 5) Forensics with Forensic Toolkit-FTK

  • What Is Forensic Toolkit-FTK

  • Create Case Name

  • Searching Evidence

  • Delete File Finding

  • Duplicate Item Finding

  • Encrypt File Finding

  • Mail ID Finding

  • Document Finding

  • Recovering Delete Evidence

  • Ram Memory Evidence

  • Ram Memory Investigation

Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 6) Forensic With Autopsy

  • Automated, intuitive workflow

  • hard drives and smart phones forensic

  • Extracts artifacts from web browsers

  • MD5 hash lookup

  • Indexed keyword search

  • Deleted file carving

  • EXIF data extraction from JPEG images

  • Geo location from JPEG files.

  • Timeline analysis for all events

  • Standard Android database parsing

  • Extension mismatch detection

  • Image gallery for picture review

  • Email message extraction

  • Report Formats: HTML, CSV,

Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 7) Data Forensics & Recovery

  • Introduction to Data Forensics

  • What Is Data Recovery

  • Type of Data Recovery

  • Hard disk Data Recovery

  • Portable Media Data Recovery

  • CD/DVD Data Recovery

  • What Is Anti- Forensics

  • Why Using Anti Forensics System

  • Live Disk & Backup System

  • Disk Cloning

  • Resource for data forensics

Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 8) File Security & Recovery

  • Word, Excel Password Security

  • Word, Excel Password Recovery

  • Advanced PDF Security

  • PDF Password Recovery

  • ZIP, RAR File Security

  • ZIP, RAR File Password Recovery

  • Online Password Recovery

  • File & Folder Security

  • Different Type of Folder Hidden Trick


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 9) Windows Forensics & Anti Forensic

  • Login Log Investigation

  • Last Activity Investigation

  • File & Folder Investigation

  • Window Log & Login Investigation

  • OS Forensics System

  • Last changed & Opened File

  • USB Forensics

  • Investigation With Live Disk

  • Basic Anti Forensics & Tool

  • VMware Workstation with (Anti – forensic)

  • Deep Freeze (Anti -Forensics)


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 10 Android Mobile Forensics

  • What Is Android

  • Root Android Devices

  • Android Forensics Tool

  • Android Data Recovery

  • Deleted Call History

  • Deleted Text Massage

  • Deleted Contact

  • Deleted Any Media


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 11 IP Tracing & Reporting

  • What Is IP(IPv4 & IPv6)

  • IP Tracing (IPv4 & IPv6)

  • IP CDR Data Investigation

  • Latter Base reporting( F.I.R & Any Other Latter )


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 12)Social Media Investigation

  • What Is Social Media

  • Introduction To Social Media Crime

  • Fake ID Detection

  • Permanently Delete Evidence

  • Victim IP address Finding All Location

  • Social Media Account User Activity Finding

  • Fact Problem of Fake Profile Cases

  • Latter Base reporting (F.I.R & Any Other Latter)


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 13) Whatsapp tracking & Investigation

  • Introduction to Whatsapp

  • Introduction to Whatsapp Crime

  • WhatsApp Data Collecting

  • Whatsapp Data Analyst

  • IP tracking & Reporting

  • The legal method of WhatsApp data tracking

  • Latter Base reporting( F.I.R & Any Other Latter )


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 14) Browser Investigation & Security

  • What Is Browser

  • Browser Spoofing & Detection

  • Browser Password Decrypted

  • Browser Investigation

  • Browser Password Forensic


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 15) Email Investigation & Security

  • Introduction to Email Working System

  • Introduction to Email related Crime

  • Introduction to header File & Analyst

  • Login IP Finding & Tracking

  • Mail Bombing & Spoofing attack

  • Mail Verification/ verify

  • Any Email Investigation Common Point

  • Investigation Free Email Technique (Ex. Gmail , Yahoo Mail)

  • Investigation Commercial Email Account Technique

  • Latter Base reporting( F.I.R & Any Other Latter )


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 16) VPN- Proxy and Tor Browser Investigation

  • What Is VPN

  • Setup VPN Security

  • VPN Investigation Guideline

  • What Is Proxy

  • Proxy Investigation Guideline

  • What Is Tor Browser

  • Tor Bowser Investigation


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 17) Person Tracking (Base on Gujarat) (note: This module practical & logically)

  • Introduction to Document

  • Types of Document

  • Document Verification

  • Person Finding Method

  • Person & Family Finding

  • Example Of Love marriage case,

  • Example Of check bounce case

  • Non-social media user Finding

  • Fraud Company & Director Verification


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 18) Child Pornography Investigation

  • Step by step Investigation

  • Reporting to anti-child porn Organization

  • All Type child crime report


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 19) Virus Programming & Security

  • What Is Virus

  • Virus Maker Tool

  • Basic Virus Programming

  • Create Different Virus

  • What Is Anti- Virus

  • Antivirus Security Setup

  • Windows Protection System Setup

  • Anti – Malware Protection

  • Reset Network & System


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 20) Mobile Spyware & Key-logger

  • What Is key logger

  • Type of Key logger

  • Mobile Spyware attack

  • Protection Against spyware

  • Remove Spyware Without Any Tool


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 21) Domain security & Investigation

  • What Is Domain

  • Introduction to Domain

  • How to Purchase Web Hosting

  • Domain Privacy

  • Add-on Base Security

  • Domain Investigation without Tool

  • Domain Investigation With To0l

  • Fraud Domain Reporting

  • Introduction to Fake website

  • History of Fake Site

  • Web Investigation Step By step

  • Reporting to Fake Site

  • Porn site Repotting

  • Latter Base reporting( F.I.R & Any Other Latter )


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 22) Web Hosting Security & investigation (Linux hosting)

  • What Hosting

  • Introduction to Hosting Panel

  • How to Purchase Web Hosting

  • How to Choice Secure Hosting Panel

  • cPanel Security

  • Coding Base Secure Hosting Panel

  • Dedicated IP Security

  • Share Hosting Weak Point

  • Hosting Server Investigation

  • Hosting Panel Investigation Step By Step

  • Website Backup System

  • Hacker link Remove from Website

  • Hacked website Recovery

  • Hacked Website Investigation

  • Website Backup System

  • Website Sensitive Information Remove from Google

  • Website Sensitive Information Protection

  • Latter Base reporting( F.I.R & Any Other Latter )


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 23) WordPress Vulnerability & Security (Only Developer)

  • What is WordPress

  • Why Using WordPress

  • WordPress Installation & Setup

  • WordPress Vulnerability

  • WordPress Themes Vulnerability

  • WordPress Plug-in Vulnerability

  • Different type attack on WordPress site

  • WordPress Backup

  • WordPress Security

  • WordPress Investigation


Cyber Crime Investigation Training In Ahmedabad | Gandhinagar | Vadodara| Rajkot

Module 24) WordPress/Joomla/ Drupal Security (Without Plug-in tool) (Only Developer)

  • XMLRPC Attack Protection

  • File injection attack Protection

  • TRACE & TRACK Blocking

  • No web server version and indexes

  • Pingback Vulnerability

  • Brute Force Attacks

  • File Protection

  • Login Page Protection

  • SQL Injection

  • Weak Directory Protection


Module 25) CDR Investigation (Only For Police Department)

  • Personal CDR Investigation

  • IMEI CDR Investigation

  • Site (Dumps) CDR Investigation

  • IP CDR Investigation

  • Reporting CDR Provider Officer

  • What Cell ID

  • Structure CDR, IP CDR, IMEI CDR, Cell ID,

  • Mobile Location Tracing IN India

  • Latter Base reporting (F.I.R & Other Latter)

  • Secret of Undetected Location & IMEI Number In CDR Data

  • Call Spoofing/fake

  • Call & SMS blasting & Protection

  • Caller number verification Method

  • Mobile Data Hacking with Script