+91 865-596-6336
||
info@dcodetech.in
Apply Now
Menu
Home
About Us
About Dcodetech
Dcodetech Achievement
Seminar and workshop/ Event
Courses
Pg Certification Training
Web Development
Python + Datascience
Data Analytics
Data Science
Machine Learning
6 Month Training
Web Desining
Machine Learning with Python
Data Science with Python
Data Analytics with Python
Python Development
Django Development
Java Development
Php Development
Mean Stack Development
Mern Stack Development
Dot Net
Android Development
Cyber Training
Cyber Training For Student
Certified Ethical Hacker (CEH)
Ethical Hacking + Cyber Security
(6 Months)
Cyber Forensic (6 Month - Hands on Indrustry base Cyber Forensic Tools)
Cyber Training For Police
Ethical Hacking & Cyber Security Workshop
Ethical Hacking & Cyber Security Training
Cyber Forensic Training(Encase Forensic / Access Data Ftk Imager)
Pg Diploma In Cyber Security (Ethical Hacking / Cyber Forensic Tools)
Goverment alliance
Placement
Place Students
Student Review
Place Student Offer Letter
Campus Drive
Internship Drive
Job/Internship
Contact
Menu
×
Home
About
About Dcodetech
Our Team
Dcodetech Achievement
Seminar and workshop/ Event
Courses
Pg Certification Training
Web Development
Python + Datascience
Data Analytics
Data Science
Machine Learning
6 Month Training
Web Desining
Machine Learning with Python
Data Science with Python
Data Analytics with Python
Python Development
Django Development
Java Development
Php Development
Mean Stack Development
Mern Stack Development
Dot Net
Android Development
Cyber Training
Cyber Training For Student
Certified Ethical Hacker (CEH)
Certified Course in Cyber Security
Ethical Hacking + Cyber Security
(6 Months)
Certificate Course in Forensic
Cyber Forensic (6 Month - Hands on Indrustry base Cyber Forensic Tools)
Cyber Training For Police
Ethical Hacking & Cyber Security Workshop
Ethical Hacking & Cyber Security Training
Cyber Forensic Training(Encase Forensic / Access Data Ftk Imager)
Pg Diploma In Cyber Security (Ethical Hacking / Cyber Forensic Tools)
Goverment alliance
Placement
Place Students
Student Review
Place Student Offer Letter
Campus Drive
Internship Drive
Job/Internship
Login
CERTIFICATE COURSE IN FORENSIC
Thane | Kharghar
Drop your details to get a callback from us
Name
Phone Number
Message
Our Training Process
CERTIFICATE COURSE IN FORENSIC CURRICULUM
Forensic Science
Computer Forensics Objective and Need
Forensics Readiness
Cyber Crime
Web Applications and Web servers Attacks
Email Crimes
Network Attacks
Forensics and Mobile Devices
Cyber Crime Investigation
Computer Forensics Investigation Methodology
Reporting a Cyber Crime
Expert Witness
Regulations, Policies and Ethics
Searching and Seizing Computers with and without a Warrant
Laws and Acts against Email Crimes
Laws pertaining to Log Management
Laws and Acts against Email Crimes
General Ethics While Testifying
Digital Evidence
Digital Evidence
Types of Digital Evidence
Rules of Evidence
Electronic Evidence: Types and Collecting Potential Evidence
Electronic Crime and Digital Evidence Consideration by Crime Category
Computer Forensics Lab
Understanding Hard Disks
Disk Partitions and Boot Process
Understanding File Systems
Windows File Systems
Linux File Systems
Mac OS X File Systems
RAID Storage System
File Carving
Image Files
Analyze Logs
Database Forensics
Email Headers
Analyzing Email headers
Malware Analysis
Mobile Operating Systems
Procedures and Methodology
Malware Analysis
Mobile Operating Systems
Investigating Computer Crime
Computer Forensics Investigation Methodology
Digital Evidence Examination Process
Encryption
First Responder
Roles of First Responder
Data Acquisition and Duplication
Defeating Anti-Forensics Techniques
Log Management and Event Correlation
Network Forensics (Intrusion Detection Systems (IDS))
Computer Forensics Reports and Investigative Report Writing
Digital Forensics
Recover Data
File System Analysis
Windows Forensics
Linux Forensics
MAC Forensics
Recovering the Deleted Files and Partitions
Steganography and Image File Forensics
Steganalysis
Application Password Crackers
Investigating and Analyzing Logs
Investigating Network Traffic
Investigating Wireless Attacks
Web Attack Investigation
Investigating Email Crime and Violation
Mobile Forensic Process
Cloud Forensics
Malware Forensics
Defeating AntiForensic Techniques
Tools/ Systems/ Programs
First Responder Toolkit
Windows Forensic Tools (Helix3 Pro, X-Ways Forensics, Windows Forensic Toolchest (WFT), Autopsy, The Sleuth Kit (TSK), etc.)
Digital Evidence Examination Process
Data Acquisition Software Tools (UltraKit, Forensic Falcon, etc.)
Tools to Defeat Anti Forensics
Steganography Tools
Database Forensics Tools
Password Cracking Tools
Network Forensics Tools
Web Security Tools, Firewalls, Log Viewers, and Web Attack Investigation Tools
Cloud Forensics Tools
Malware Forensics Tools
Email Forensics Tools
Mobile Forensics Software and Hardware Tools
Report Writing Tools
JOIN THIS TRAINING
Starts
2025
Duration
3 Months , 2 hrs / daily
Institution
DCODETECH
Level
Intermediate
Seats Available
15
SHARE THIS PAGE
JOB PROFILE
Malware analyst
Incident handler
Cyber forensic analyst
TOOLS
Ftk
Osforensic
Encase
Autopsy
Download Brouchure
Drop your details to know more about course
×
First name
Last name
Phone
Email
Type Your Message