Explore the
Cyber Investigation & Digital Forensics Internship 2024
Join us for an enlightening webinar on Cyber Crime Investigation, where industry experts and professionals will converge to discuss the latest trends, techniques, and challenges in combating cybercrime. This event is designed for law enforcement officers, cybersecurity professionals, legal experts, and anyone interested in understanding the complexities of cybercrime investigations.
This internship opportunity includes some points that's helpful for an investigator
(Starts From 1 July,2024- Syllabus)
Basic Flow of Learning
->Cyber Crime: Hacking Incidents, Identity theft, Data Breach, Corporate Espionage etc
->Understanding and Interpretation of IT Act, IPC, CrPC and Indian Evidence Act and Role of various Cyber Agencies.
->Cyber Forensics Investigation: Rules, Procedures and Legal Aspects
->Preservation of Evidence
->Collection of Evidence
->Examination of Evidence
->Securing Evidence
->Analysis of Evidence
->Basics of the Internet, Surface, Deep and Darknet and Crypto Currency
->Standard Operating Procedures (SOP) for investigation of MobileApplication related financial frauds.
->Overview of Call-based crimes, investigation of day-to-day crimes using Call Data Record, Examination of Call Detail Record (CDR).
->Overview of Analysis of IPDR & ILD CDR for crime investigation .
->Overview of CCTV evidence collection – handling complaints, Seizure toolkit, documenting details, pre-evidence collection, do’s and don’ts, and the process to retrieve videos.
->Cyber Crime Investigation Methodology
->Evidence from Crime Scene
->Documenting the Crime Scene
->Documenting Storage Devices
->Forensics Tools
Intermediate Flow of Learning
->Storage Media, Hard Disk, RAID, MBR, Partiion, File System Forensics
->OSINT-> Extra Ordinary Open-Source Intelligence (OSINT) and how to gather relevant information using social media analytics with the help of various open-source tools.
->GEOINT->Geospatial Intelligence
->Windows Forensics
->Mac Forensics
->Linux Forensics
->Smartphone - Mobile Forensics
->Digital Data Obfuscation
->Cyber Surveillance
->Vulnerabilities Exploitation
->Analyzing Malicious Malware
->Network,E-Mail, Image,Browser,Printer,Live Box Forensics
->Social Networking Forensics (Investigation of Social Media Crimes like Cyber Stalking, Bullying, Fake Content etc and also understand Social Media Evidence Gathering.)
->Geo-location, GPS, Geo-Tagging Analysis
->Cloud Forensics, Physical - Remote Server & Virtual Machine Forensics
Investigation of YouTube Related Crimes including Platform Specifics and Legal Notice Preparation.
Advance Flow of Learning
->SIGMINT->Signal Media Intelligence
->Techniques of CDR/ IPDR Analysing
->Tower Dumping of Networks
->Offensive & Defensive Skillset of Suspect finding
->Location tracking analysis
->Malware Rectification
->Demistying Darkweb & Deepweb
->Anatomy rectification of Apk & .Exe Files
->RAM Forensics & Kernal Analysis
->File Signature and Hash Analysis
->Encryption & Password Cracking
->Advance Windows Forensics
->Advance Fred & EnCase
->->Advanced internet crime investigation including investigation of domain or IP driven crimes, investigation of live and deleted / deactivated websites, content removal procedures, evidence acquisition from webpages, legal notices and tools for website investigation.
->Advanced email crime investigation including investigation procedures, data retrieval, header analysis, legal notices and tools.
->Advanced social media crime investigation including gathering evidence, sentiment analysis, legal notices and tools for social media investigations.
->Offensive investigation methods including understanding CVEs, VAPT, web application security including SQL injection, XSS and using pre-built tools for investigation and cautions while undertaking such investigations.
->Cyber-terrorism and dark web including recruitment, spread of propaganda on Internet, understanding botnets, honeypots, crypto currency investigation toolkit, search engine and other tools for dark-web investigation.
->Cyber Forensics Live Case Study Challenge
->Cyber Crime Investigation Live Case Study Challenge
->Live Exposure from Law Enforcement officer of CID/CB
Explore the
Cyber Investigation & Digital Forensics Internship 2024
Join us for an enlightening webinar on Cyber Crime Investigation, where industry experts and professionals will converge to discuss the latest trends, techniques, and challenges in combating cybercrime. This event is designed for law enforcement officers, cybersecurity professionals, legal experts, and anyone interested in understanding the complexities of cybercrime investigations.
This internship opportunity includes some points that's helpful for an investigator
(Starts From 1 July,2024- Syllabus)
Basic Flow of Learning
->Cyber Crime: Hacking Incidents, Identity theft, Data Breach, Corporate Espionage etc
->Understanding and Interpretation of IT Act, IPC, CrPC and Indian Evidence Act and Role of various Cyber Agencies.
->Cyber Forensics Investigation: Rules, Procedures and Legal Aspects
->Preservation of Evidence
->Collection of Evidence
->Examination of Evidence
->Securing Evidence
->Analysis of Evidence
->Basics of the Internet, Surface, Deep and Darknet and Crypto Currency
->Standard Operating Procedures (SOP) for investigation of MobileApplication related financial frauds.
->Overview of Call-based crimes, investigation of day-to-day crimes using Call Data Record, Examination of Call Detail Record (CDR).
->Overview of Analysis of IPDR & ILD CDR for crime investigation .
->Overview of CCTV evidence collection – handling complaints, Seizure toolkit, documenting details, pre-evidence collection, do’s and don’ts, and the process to retrieve videos.
->Cyber Crime Investigation Methodology
->Evidence from Crime Scene
->Documenting the Crime Scene
->Documenting Storage Devices
->Forensics Tools
Intermediate Flow of Learning
->Storage Media, Hard Disk, RAID, MBR, Partiion, File System Forensics
->OSINT-> Extra Ordinary Open-Source Intelligence (OSINT) and how to gather relevant information using social media analytics with the help of various open-source tools.
->GEOINT->Geospatial Intelligence
->Windows Forensics
->Mac Forensics
->Linux Forensics
->Smartphone - Mobile Forensics
->Digital Data Obfuscation
->Cyber Surveillance
->Vulnerabilities Exploitation
->Analyzing Malicious Malware
->Network,E-Mail, Image,Browser,Printer,Live Box Forensics
->Social Networking Forensics (Investigation of Social Media Crimes like Cyber Stalking, Bullying, Fake Content etc and also understand Social Media Evidence Gathering.)
->Geo-location, GPS, Geo-Tagging Analysis
->Cloud Forensics, Physical - Remote Server & Virtual Machine Forensics
Investigation of YouTube Related Crimes including Platform Specifics and Legal Notice Preparation.
Advance Flow of Learning
->SIGMINT->Signal Media Intelligence
->Techniques of CDR/ IPDR Analysing
->Tower Dumping of Networks
->Offensive & Defensive Skillset of Suspect finding
->Location tracking analysis
->Malware Rectification
->Demistying Darkweb & Deepweb
->Anatomy rectification of Apk & .Exe Files
->RAM Forensics & Kernal Analysis
->File Signature and Hash Analysis
->Encryption & Password Cracking
->Advance Windows Forensics
->Advance Fred & EnCase
->->Advanced internet crime investigation including investigation of domain or IP driven crimes, investigation of live and deleted / deactivated websites, content removal procedures, evidence acquisition from webpages, legal notices and tools for website investigation.
->Advanced email crime investigation including investigation procedures, data retrieval, header analysis, legal notices and tools.
->Advanced social media crime investigation including gathering evidence, sentiment analysis, legal notices and tools for social media investigations.
->Offensive investigation methods including understanding CVEs, VAPT, web application security including SQL injection, XSS and using pre-built tools for investigation and cautions while undertaking such investigations.
->Cyber-terrorism and dark web including recruitment, spread of propaganda on Internet, understanding botnets, honeypots, crypto currency investigation toolkit, search engine and other tools for dark-web investigation.
->Cyber Forensics Live Case Study Challenge
->Cyber Crime Investigation Live Case Study Challenge
->Live Exposure from Law Enforcement officer of CID/CB