Stay Connected

Computer and Information Technology

Orgnise our Workshop / Training?

Cyber Forensics & Crime Investigation

This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific study, research and implementation of computer science subjects for the purpose of gathering digital evidence in cases of cyber crimes or for other scientific research purposes also it introduces the needs of the current cyber security sector.

Topics covered in workshop:

Day 1: Session 1

Understanding of an Organization’s IT Environment
Concept of Zoning – Demilitarized Zone, Militarized Zone
Basic Servers being used in the IT Environment and their positioning in different Zones
Brief Insight of the IT Security Devices used

What is Computer Forensics all about?
Difference – Computer Crime & Un-authorized activities.
6 steps involved in Computer Forensics – Description of what is to be carried in each step
Need for forensics investigator

Security Incident Response
What is a Security Incident
Role of the Investigator in investigating a Security Incident
Evidence Control and Documentation
Skills and Training of a Forensics Investigator – Technical, Presentation, Professional

Corporate Regulation and Privacy Issues
Computer Abuse in the Corporate World
Security Policies
Security and Acceptable-Use Policies

Day 1: Session 2

Evidence Control and Documentation
Document, Documents, Document.
Evidence Collection and Inventory
Chain of Custody
Evidence Storage and Security

Building a Forensics Laboratory
Laboratory Standards
Facility Physical Security
Evidence Security
Software
Hardware
Portable Forensics Labs

Commercial forensics software tools
The Case for Commercial Tools
Encase
Access Data Forensics Tool Kit
DriveSpy and Paraben

Day 2: Session 1

Open source forensics tools
Windows Forensic Analysis Tools Open Source
Process Explorer from SysInternals
WhatsRunning
Registry Decoder CPORTS
Windows File Analyzer
Windows File Checksum Integrity Verifier
Registry Ripper
Microsoft Log Parser Tool

Open Source Disk Imaging Tools
What is Disk Imaging
Utilities of Disk Imaging Disk Imaging Utilities
Access Data FTK Imager
DixmlSetup

File Analysis
What is File Analysis?
File Attributes
Unix File Permissions
Known File Type Signatures & Hashes
Malware Infected Files
Virus Characteristics
Indications of a Trojan Infection
Worms Windows File Analyzer- File Analysis Software

Log analysis
Why Log Analysis
Windows Log analysis
Tools for Log Analysis
OSSEC HIDS
Installation Logs
Windows Event Logs
UNIX Syslogs
Firewall and IDS/IPS Logs
Apache Access Logs & Error Logs.

Day 2: Session 2

Windows Forensics
LIVE VS DEAD RESPONSES – WHEN AND WHY
NETWORK CONNECTIONS TCP-States
Demo-Whats Up Running Tool
Demo-Process Explorer Tool
Demo-CPorts
Windows Processes
Demo-Services.msc
Hidden Files
Concept of ADS (Alternate Data Stream)
Demo-Windows File Analyser Tool
AUDITING & THE SECURITY EVENT LOG
Demo- Windows File Checksum Integrity Verifier
Demo- Access Data Forensics Tool Kit
Create a Disk Image

Linux Forensics
Network connections,
Services
Logging and log files in UNIX
Linux forensics tools
Demo – Real Time Command Logging
Forensic Analysis using OSSEC HIDS

CONCLUDING THE INVESTIGATION
Documentation
Preparation
Concluding a Corporate Investigation
Testifying in Court
Ethical Responsibilities

Hardware Kit: This workshop does not include any hardware kit.

Requirements:
- A working Laptop/PC with minimum of 2 GB RAM, 100 GB HDD, intel i3+ processor
- OS: Linux, Vmware
- A Seminar Hall with sitting capacity of all participants along with charging plugs, proper ventilation
- Projector, Color Mike and Speakers

Benefits:
- Digital toolkit of PPTs and study material for all participants
- Certificate of Participation for every participant.
- A competition will be organized at the end of the workshop and winners will be awarded by Certificate of Excellence.

© 2024 HT India Labs - All Rights Reserved

Powered by Animax Technology