Cyber forensic is the field of Digital Forensic Science concerning legal proof found in digital storage devices like hard disks, flash drives and alternative proof found in devices and computers. This course helps participants to grasp the ideas of digital forensics, associated build them capable to look at digital media in an skilled approach, with latest and most successful strategies and techniques with aim of preserving the proof and recovering the lost or deliberately erased information, analyzing and presenting the facts and opinions concerning data recovered from the scene of crime.
As name suggests, ethical hacking is an ethical approach of operating with technology to search out weakness of a system taking it to future level for more development. Hacking is rarely illegal its associate action of exploitation skills and advanced techniques on a target to realize data about a system and its surroundings, though it depends on the character of the one that is performing the action. The most focus of the Ethical Hacking related IT Securities course is to familiarize the students into an interactive setting wherever the students can learn the aptitudes of activity vulnerability assessment, pen-testing of systems and networks, repairing the weaknesses, creating reports of scanned vulnerabilities.
You will familiarize with Ethical Hacking and Information Security that will enhance their skills making them confident in handling the all situations such as zero-day incidence response, data-theft management, incidental data lost or an Intrusion by the unauthorized. As almost every organization now days have its own website, database servers, which handle and stores confidential data related to the future and on-going projects, staff details, customer’s details, member’s login credentials, credit card details and other sophisticated data. An Information security expert is a first priority personal required for the security of this files.
Course leading edge techniques square measure tutored to students by business level certified professionals. A virtual setting created for college students, helps the participant to apply and perform period of time attacks on a virtual simulation network, advanced level penetration testing techniques, privilege increase techniques that intruders use to penetrate the network.
Nowadays, cyber forensics also can be employed in civil proceedings. It involves all techniques just like the info recovery, however some extra pointers and practices are measure followed to form a legal audit path. Participants of this course get trained with the most effective techniques that square measure used throughout information forensic investigations.
Phone and electronic devices, cyber forensics as well as portables, desktops and servers. Incident Response, iOS forensics, network forensics, code recovery, image forensics, storage forensics as well as hard-disk information recovery, getting image and copying data, flash drive recovery, enclose forensic toolkit, foremost, COFEE, hash keeper and alternative essential and most fruitful techniques are used in learning period.
FTK, forensic Toolkit information acquisition and getting. Steganography and alternative image file, wireless attack investigation by analyzing logs, internet attacks investigation, email tracing and investigation, mobile crimes and forensics, reporting, the way to become witness. All the aspects are coated in our specially designed course for participants trying their career in digital crime investigation and cyber forensics.
Module 1 Computer forensics in today's world
The field of computer forensic or cyber forensic is still in its emerging periods. This course module on computer forensic in today's world. it would be introduce you to computer forensic, evolution of computer forensics, its objectives and benefits, forensic readiness planning, cyber-crimes, computer crimes, cybercrime investigation techniques and tools, role of a forensics investigator, digital evidence in forensic investigation, corporate investigations, explain the key concepts of enterprise theory of investigation (ETI), discuss various legal issues and reports related to computer forensic investigations.
Module 2 Computer forensics investigation process
Computer forensic investigation process discuss some of the most vital issues and concerns that cyber forensic investigators face today. Module will explain overview of computer crime investigation process, investigation methodology, steps to prepare for a computer forensic investigation, evaluation and securing the scene of crime, collection and preservation of evidence, different techniques to acquire and analyze the data, the importance of evidence and case assessment, report writing and testify in the court as an expert witness.
Module 3 Searching and seizing computers
Under this module, students would be taught about the methods of searching and seize computers without a warrant, the Fourth Amendment’s “Reasonable Expectation of Privacy”, consents, scope of consent, the steps involved in searching and seizing computers with a warrant, the basic strategies for executing computer searches, Privacy Protection Act, drafting the warrant and affidavit, the post-seizure issues, Electronic Communications Privacy Act, voluntary disclosure, Electronic Surveillance in Communications Networks, how content is different from addressing information and overview of evidence and authentication
Module 4 Digital evidence
Digital evidence is evidence transmitted in binary form that may be depend on in court. It can be found in a computer, CDs, hard drive, a mobile phone, PDA, a flash card in a camera etc. Digital evidence is usually allied with electronic crime such as child pornography, credit card fraud and many more. The module formerly cover aspects of digital evidence and explain its role in case of a computer security incident, the characteristics of digital evidence, digital data, federal rules of evidence, the international principles for computer evidence, Scientific Working Group on Digital Evidence (SWGDE), the considerations for collecting digital evidence from electronic, the overview of digital evidence examination processes and steps and digital evidence consideration by crime category.
Module 5 Understanding hard disks and file systems
In this module, the students will be introduced with hard disk drive, explain solid-state drive (SSD), overview of physical and logical structure of a hard disk, various types of hard disk interfaces, examine the components of a hard disk, disk partitions, explain windows and Macintosh boot process, introduction of file system, various types of file systems, explain an overview of windows, Linux, mac OS x, and sun Solaris 10 file systems, CD-ROM/DVD file system, raid storage system and raid levels and the file system analysis using the sleuth kit.
Module 6 Windows forensics
Windows forensics examination emphases on building in-depth digital forensic information of the Microsoft windows operating structures. In this module, the students will be introduced with volatile information, network and process information, non-volatile information, memory dump, Parsing Process Memory, different techniques for collecting nonvolatile information such as registry settings and event logs, various processes involved in forensic investigation of a Windows system such as memory analysis, registry analysis, IE cache analysis, cookie analysis, MD5 calculation, Windows file analysis, and metadata investigation, IIS, FTP, and system firewall logs, importance of audit events and event logs in Windows forensics, the static and dynamic event log analysis techniques, different Windows password security issues such as password cracking, analyze restore point registry settings, cache, cookie and various forensics tools.
Module 7 Data acquisition and duplication
Data acquisition and duplication module will explain various types of data acquisition systems, various data acquisition formats and methods, determine a best acquisition method, contingency planning for image acquisitions, static and live data acquisition, an overview of volatile data collection methodology, various types of volatile information, disk imaging tool, Linux and windows validation methods, raid disks and list of various data acquisition software and hardware tools.
Module 8 Recovering deleted files and deleted partitions
Under this module, students would be taught how to recover files in Windows, MAC, and Linux, file recovery tools for Windows, MAC and Linux, how to identify creation date, last accessed date of a file, and deleted sub-directories and How to recovering the deleted partitions and list partition recovery tools.
Module 9 Forensics investigation using access data FTK
Forensics investigation using access data FTK would be comprises the forensic toolkit and discuss its various features, FTK installation steps, FTK case manager, restore an image to a disk, explain FTK examiner user interface, how to verify drive image integrity, how to mount an image to a drive, the functions of FTK interface tabs, the steps involved in adding evidence to a case, local live evidence, remote device management system, imaging drives, mount and unmounts a device and decrypt EFS files and folders.
Module 10 Steganography and image file forensics
Steganography and image file forensics summarizing the steganography and its types, list of application of steganography, how to detect steganography, various steganography detection tools, image file formats, compress data, locate and recover image files, how to identify unknown file formats and picture viewer and image file forensic tools.
Module 11 Application password crackers
It first presents the password crackers terminologies, the functionality of password crackers, various types of passwords then discuss the work of password cracker, password cracking techniques, types of password attacks, applications of software password cracking, define default passwords and its cracking tools.
Module 12 Network forensics, investigating logs and investigating network traffic
Network forensics, investigating logs and investigating network traffic would be introduce you to the network forensics concepts, its mechanism, IDS, firewall, honeypot, network vulnerabilities, network attacks, new line and timestamp injection attack, logs as evidence, Network Traffic, DNS poisoning techniques, ARP table and List various traffic capturing and analysis tools.
Module 13 Investigating web attacks
This module focusses on web applications, its architecture, Web logs, web servers, Internet Information Services (IIS), apache web server logs, Web attacks, investigation process of web attacks in windows-based servers and various tools for locating IP.
Module 14 Tracking emails and investigating email crimes
Tracking emails and investigating email crimes explain the email system, email clients, email servers, mail message, importance of electronic records management, types of email crimes, email header, steps involved in investigation and tools of Email crimes and different laws and acts against email.
Module 15 Mobile forensics
Nowadays electronic device mobiles are very common. Module will introduce you to the hardware and software characteristics of mobile devices, cellular network, mobile devices, mobile operating system, mobile forensics challenges, various memory considerations in mobiles and tools and techniques to investigate the crimes related to mobile.
Module-16 Introduction to ethical hacking
The meaning of the ethical hacking and the ethical hacker is used to define the hacking performed by an organization or a person to help in the identification of the threats in a network or electronics. Ethical hackers can undertake an effort to penetrate networks and evade way previous the computer securities and examine any points that could be exploited through the malicious hackers.
Introduction to ethical hacking introduces the general introduction of hacking, history of hacking, famous hackers, phases of hacking, ethical hacking industry practices, difference between ethical hacker and malicious hacker and types of hackers.
Module-17 Foot printing and reconnaissance
Foot printing and reconnaissance is the initial phase and very essential evil that penetration tester used to assess for the IT infrastructure security and indicates the maximum figures about the devices and networks.
The basics techniques used for foot printing is ping sweep and TCP Scans.
Module summarizing the foot printing concepts, objectives of foot printing, footprint methodology like- footprint through search engines, finding company’s external and internal URLs, collect location information, people search online services, people search on social networking services, foot printing through job sites, website foot printing, website mirroring tools, extract website information, email foot printing, tracking email communications, collecting information from email header, email tracking tools.
Apart from this, it is also comprises the foot printing using Google, Google hacking techniques, Google advance search operators, Google hacking tool, Google hacking database (GHDB), DNS foot printing, foot printing through social engineering and foot printing tools such as maltego, DNSEnum, Dmitr etc.
Module-18 Scanning network
Network scanning is a procedure to finding information and identifying the attacker, IP address and so on. The module structure covers the introduction of scanning, introduction of ports and protocols, types of scanning - port scanning, network scanning and vulnerability scanning. Objective of scanning - detect live systems on network, discover open ports on system, OS detection, service detection and version detection, obtaining IP from host, obtaining host from IP, discover IP addresses in network and overview of TCP. The introductory part of scanning tool like – Nmap, Host, NBT scan, Fping, Alive6, Netcat, Vega and Nessus.
First attack on target network is enumeration. It is procedure to take all information of the user, user name, machine information, resources of networks, services etc. In this module you will introduced with the enumeration. The fundamentals of the enumeration concepts, techniques for enumeration, services and ports to enumerate.
Module-20 System hacking
Password hacking are divided into four categories – active online attacks, offline attacks, passive online attacks and non-technical attack. system hacking module is completely comprises the information at hand before system hacking stage, system hacking - cracking password, window hacking by Ophcrack, window hacking by hiren boot, window hacking by CMD, Linux hacking.
Module-21 Trojans and backdoors
Trojans is a programme that pretenses as a benevolent application. The main Trojan horses are Data Sending Trojans, Proxy Trojans, Destructive Trojans, Remote Access Trojans, FTP Trojans, security software disabler Trojans and denial-of-service attack (DoS) Trojans. Backdoor is way of accessing a programme or in the meaning of the entire computer system. It is also known as trapdoor.
The structure of the module will define you to concepts of Trojans, Trojan creators, indications of a Trojan attack, Trojan infection, Trojan Tools, and the detection methods of Trojan.
Module-22 Viruses and worms
Virus, Trojans, worms etc. are the part of the malware or malicious software. All these are specially designed to steal, harm, and interrupt the networks. Virus is very harmful for computer and it attached itself and spread from one to another systems and infect the systems. Worms are classified as a sub class of virus. In additional nature, worms spread from system to system without any human actions. Both are malicious program that self-replicate on systems or through computer networks without any awareness of the user being. Subclasses of malware programs contains - Email-Worm, Net-Worm, IM-Worm, IRC-Worm, P2P-Worm etc.
The module will introduce you to introduction and nature of virus and worms, difference between viruses and worms, key loggers, virus detection methods, virus and worms countermeasures.
It covers the all aspects of the sniffing such as overview of sniffing, types of sniffing, active and passive, introduction to ARP poisoning, MITM, sniffing tools- ettercap, cain and able and wireshark.
Module-24 Session hijacking
In the field of application security session hijacking is very ancient and repetitive topic. The module will focus on introduction to session hijacking, difference between spoofing and hijacking, steps of session hijacking, types of session hijacking, brief introduction of TCP three way handshake, client-server model - two-tier and three-tier.
Module-25 Social engineering
It is the resources of the information. The module will comprises the concepts of social engineering, behaviors vulnerable to attacks, factors that make companies vulnerable to attacks, social engineering techniques, types of social engineering such as human based, system based and mobile based.
Module-26 Denial of service (DoS)
An attack is an event in which a user or association is deprived of the services of a store they would usually expect to have, is known as Denial of service (dos). Module will describe you to the concepts of Dos, denial of service attack, symptoms of a dos attack, Cyber Criminals and Case Studies.
Module-27 Hacking webserver
Hacking webserver, introduction to web server, introduction to database and the hacking webserver with Metasploit would be comprising in this module.
Module-28 SQL injection
It is a code injection method used to attack the data-driven application in which malware SQL statements are inserted into an entry field for implementation. The module will introduce you to the introduction of SQL injection, vulnerability testing for SQL injection, SQL injection cheat sheet, SQL injection tools like SQL MAP and Havij.
Module-29 Hacking wireless networks
Hacking wireless network will describe you to the concepts of the wireless, wireless standards, service set identifier (SSID), Wi-Fi authentication modes, Wi-Fi authentication process using a centralized authentication server, wireless encryption, types of wireless encryption and its works.
Module 30 Cryptography
Cryptography is a crucial tool for protecting info in systems. This course explains cryptography concepts, types of cryptography, and the algorithms such as symmetric, asymmetric and hash.
This practical module is designed related to prospectus modules for classroom students. The practical would inform the students with Cyber Forensic and Ethical Hacking such as Information Gathering Including- a person, company or an organization. Vulnerability Assessment of a Website, Server System, Penetration Testing, System Hacking, Password Attacks, Cracking Password, Administrative Policies, Wireless Communication Attacks, Encryption System, Anti-virus Forensics, Forensic Imaging, Email Forgeries, Phishing Attacks, Social Engineering Techniques, Network Forensics, Reporting Skills and manifold case studies.
Module-1: Cyber forensics investigation- Computers have become a vital part of the advancing human race. In a very tender age, a person gets exposed to the computers and starts using it, without being aware of the possible threats it can pose to one’s social and personal security. Thus, in this one month training session students will be exposed to various investigative techniques as: social networking sites (Facebook, Twitter) crime investigation, cyber forensic, data collection from crime scene, E-mail tracking, deleted data recovery, formatted disk recovery, hard disk imaging, target (child, spouse, vehicle) tracking, fake website scams, internet crime investigation, cyber forensic security, asset tracking and recovery and lastly the evidence recovery.
Module-2: Computer forensics with open source tools- In the practical training sessions offered for cyber forensic, students will be made aware of various cyber threats, their legal aspects, examination methods of fake printing of counterfeit currency and other documents, computer scanners, imaging software such as photoshop, photo paint etc., software piracy and the data recovery.
Module-3: Mobile phone investigation- Besides computers, mobile phones and gadgets as tablets, iPod and iPad have become the necessities of today’s techno-freak world. Thus, in the recent years the crime rate by the use of mobiles have increased evidently. The students will be provided with sequential practical sessions on phone banking investigation, software piracy, WhatsApp message verification, windows and android phone forensics investigation. In addition, students would also be directed regarding call, SMS, MMS details examination, IP tracking, Email leak investigation, webcam scams, net banking and Phone Banking Analysis.
Module-4: Acquisition, collection and seizure of magnetic media- Under You will study acquisition, collection and seizure of magnetic media, how to create a cyber-crime policy, and the full knowledge and practice of how to appliance it. You will consent with a cyber-forensic toolkit that will allow you to accomplish a lawfully permissible forensic investigation.
Module-5: Documenting a "Chain of Custody"- Documentation and chain of custody is very important for every case. Chain of custody denotes to documentation that classifies all changes in the controls, handling of evidence, custody, possession, or custody of an evidence. In the practical session, you would be familiarize to the process of tagging hardware device or evidence, methods of documentation other facts related to the case, and other evidence depending on the relations of your investigation members.
Module-6: Recovering internet usage data- The easiest technique is to try a system restore. If the web history was deleted recently system restore can recover it. To urge system restore up and running you'll be able to attend the ‘start’ menu and do a groundwork for system restore which can take you to the feature. As an alternative, attend ‘Start’ click on ‘Programs’ then ‘Accessories.’ You’ll see a ‘System Tools’ possibility and ‘System Restore’ are in there. Choose the date you’d prefer to restore your laptop to and sit back and wait till it will its issue. Once finished the pc can boot and if check your browser the web history ought to be in there. Training module would be comprises the methods, tools and technique of the recovering internet usage data etc.
Module-7: Recovering swap files/temporary files/cache files- Under this practical section, students would be taught about the, finding the temporary files, finding and using the temporary and auto save files, the restoration, hanging around and practice on a quick recovery- programs which will recover these files do thus by looking through the FAT for entries that are flagged, and conjointly by scanning the disk drive for clusters that appear as if they'll be files. The foremost basic of those programs accustomed be a part of the Microsoft OS, specifically the undelete.exe, however since the introduction of the recycle bin, Microsoft has stopped provision the program. There are a unit many utilities out there which will perform an identical perform underneath newer versions of Windows.
Module-8: Digital evidence, mobile and computer forensics- Digital evidence is evidence transmitted in binary form that may be depend on in court. It can be found in a computer, CDs, hard drive, a mobile phone, PDA, a flash card in a camera etc. Digital evidence is usually allied with electronic crime such as child pornography, credit card fraud and many more. The module formerly cover aspects of digital evidence and explain its role in case of a computer security incident, the characteristics of digital evidence, digital data, federal rules of evidence, the international principles for computer evidence, Scientific Working Group on Digital Evidence (SWGDE), the considerations for collecting digital evidence from electronic, the overview of digital evidence examination processes and steps and digital evidence consideration by crime category.
Module-9: Linux/Unix computer forensics (Understanding hard disks and file systems)- In this module, the students will be introduced with a practical knowledge of hard disk drive, explain solid-state drive, overview of physical and logical structure of a hard disk, various types of hard disk interfaces, examine the components of a hard disk, disk partitions, explain windows and Macintosh boot process, introduction of file system, various types of file systems, explain an overview of windows, Linux, mac OS x, and sun Solaris 10 file systems, CD-ROM/DVD file system, raid storage system and raid levels and the file system analysis using the sleuth kit.
Module-10: File storage dates and time- File storage dates and times would be familiarize you to the process and tool and techniques of the storage data in practical manner. It will also comprise the real case work practice.
Module-11: Windows forensics- In this practical training module, the students will be introduced with volatile information, network and process information, non-volatile information, memory dump, Parsing Process Memory, different techniques for collecting nonvolatile information such as registry settings and event logs, various processes involved in forensic investigation of a Windows system such as memory analysis, registry analysis, IE cache analysis, cookie analysis, MD5 calculation, Windows file analysis, and metadata investigation, IIS, FTP, and system firewall logs, importance of audit events and event logs in Windows forensics, the static and dynamic event log analysis techniques, different Windows password security issues such as password cracking, analyze restore point registry settings, cache, cookie and various forensics tools.
Module-12: Data acquisition and duplication - Data acquisition and duplication module will explain you in a practical manner, various types of data acquisition systems, various data acquisition formats and methods, determine a best acquisition method, contingency planning for image acquisitions, static and live data acquisition, an overview of volatile data collection methodology, various types of volatile information, disk imaging tool, Linux and windows validation methods, raid disks and list of various data acquisition software and hardware tools.
Module-13: Recovering deleted files and deleted partitions- Under this training module, students would be taught how to recover files in Windows, MAC, and Linux, file recovery tools for Windows, MAC and Linux, how to identify creation date, last accessed date of a file, and deleted sub-directories and How to recovering the deleted partitions and list partition recovery tools.
Module-14: Forensics investigation using encase - Introduction to EnCase forensics, its uses, and functionality, EnCase forensics modules, how to configure EnCase, case management, verification process of evidence files, source processor, various types of bookmark and report writing would be comprises in this module.
Module-15: Steganography and image file forensics - Steganography and image file forensics summarizing the steganography and its types, list of application of steganography, how to detect steganography, various steganography detection tools, image file formats, compress data, locate and recover image files, how to identify unknown file formats and picture viewer and image file forensic tools.
Module-16: Application password crackers - It first presents the password crackers terminologies, the functionality of password crackers, various types of passwords then discuss the work of password cracker, password cracking techniques, types of password attacks, applications of software password cracking, define default passwords and its cracking tools.
Module-17: Investigating wireless attacks - In this module, students will be accustomed to the advantages and disadvantages of wireless networks, components of wireless networks, types of wireless networks, MAC filtering, SSID, wireless encryption, wireless attacks, investigate of wireless attacks and wireless forensics tools.
Module-18: Investigating web attacks - This module focusses on web applications, its architecture, Web logs, web servers, Internet Information Services (IIS), apache web server logs, Web attacks, investigation process of web attacks in windows-based servers and various tools for locating IP.
Module-19: Tracking and investigating email crimes-Tracking emails and investigating email crimes explain the email system, email clients, email servers, mail message, importance of electronic records management, types of email crimes, email header, steps involved in investigation and tools of Email crimes and different laws and acts against email.
Module-20: Investigative reports- Importance of reports and need of an investigative report, salient features of a good report, layout of an investigative report, guidelines for report writing and report using FTK and pro discover will be cover in this module investigative reports.
The evaluation procedure followed for the classroom courses is entirely different, when compared to online/distance learning courses. A weekly test is conducted for the students enrolled into the classroom courses, in order to assess their involvement into the class curriculum. This helps the trainer in narrowing down the doubts and queries of the students regarding the subject.
The mode of examination for the classroom students will be like any other examination pattern. During the course duration, students will be asked to prepare their practical files, date wise along with the completion of a particular practical. They are expected to be sincere in their curriculum, as this quality would provide them with an additional advantage. Along with the practical, during the mid-sessions, they will be allotted a topic as an assignment, which they are expected to complete in about fifteen to twenty days maximum. After the course is thoroughly completed, a written examination is conducted on a decided date. The students are given question paper having multiple choice questions (MCQs) as well as the subjective questions.
The complete correction takes almost fifteen days. Once the correction is finally undertaken, the mark sheets and certificates of every student is prepared and they are officially called upon to inform them regarding the distribution date. On the stipulated date, they are expected to come to the Institute and collect the respective documents.
We provide Internships to all the interested students, as by this plan we aspire to make the students analytically prepare for a scientific investigative technique. Through this programme, we equip the interns with all the necessary scientific techniques and logical thinking that one must implicate and possess while dealing with cases that require and a very thorough, yet minute observation, ensuring that no fact or detail is left behind, erroneously.
During the internship, every intern is allotted a mentor, who will guide him/her throughout the internship period. The prime duty of an intern is to learn the basics and the practical techniques employed in investigation, by the help of their mentor.
Eligibility criteria for internship
Participants should be in their junior or last year in college or in any graduate school, pursuing a degree in Forensic Science, Criminology, Biology, Chemistry, Quantitative Analysis, Biotechnology, Analytical Chemistry, Instrumental Analysis, Biochemistry, Microbiology, Cell Biology, Genetics, Physics or other equivalent disciplines.
Internship program duration
The 30 to 45 days non-paid internship will necessitate each intern to complete an assigned project topic with a Forensic Laboratory fellow containing of a wide works assessment, laboratory related experiments and researches and manifold practices on real case studies and field works.
Illustrations of Forensic Science Laboratory work includes
Crime Scene investigation and managements- (practices on real or mock indoor and outdoor crime scene), collection and preservation of evidence, crime scene reconstruction, chain of custody, strategies of the investigation of the scene of crime and therefore the searching methods of the physical proofs with definition, sorts and their significances. The subject can embody assortment, preservation, packaging and forwarding of various sorts of proof to the laboratories and their outcomes. This internship is meant to instruct you to the multiple real case studies.
Physical evidence collection and preservation- In the steps of the investigation of crime scene, modern methods of the investigation of the crime scene and the searching methods of the physical evidence with definition, types and their significances. The internship session will include collection, preservation, packaging and forwarding of different types of evidence to the laboratories and their outcomes. This internship programme is designed to instruct you to the multiple case studies.
Fingerprinting- The practical delineate you to the general fingerprint introduction, history of fingerprint, classification and divisions of fingerprint, development of fingerprint etc. In other facets, the practical module deliberate wholly the practical parts to development, examination of fingerprints and report writing.
You would be practice on different types of fingerprints and their methods of development.
Physical methods- Roll and flat method, powder techniques; black powder, fluorescent powders, magnetic powder, cyanoacrylate method etc.
Chemical methods- Iodine fuming (Nonpermanent visualization), Ninhydrin (Reacts with proteins), AgNO3 (Reacts with salt) etc.
Advanced techniques- Live scanner technique.
Levels to examine and identification of fingerprint - fingerprints have three phases of study
1. Pattern identification
2. Minutiae examination
Practicals of other identification marks- Practicals of other identification marks will introduce you to the introduction to the other identification marks, role and importance of other impressions, nature and problems of unique identification marks, types of tool and techniques photography of impressions evidence, recording etc.
It will enable the participants to- Lip Print, Footprint and Skid Marks would also be a part of this training module in an accompanying manner.
Questioned Document examination (forgery) and visual illustration and case study of questioned documents- Interns will be taught about the documents, their nature, problems, and examination. The fundamentals of handwriting verification, examination and signature verification are introduced to the internship participants along with the practical sessions on the common types of cases that we encounter on a general basis. This module would enable the trainees to differentiate very precisely between genuine writing and signature, to a forged one. The importance of photography at crime scene and its utility in legal proceedings.
Visual illustration and case study of questioned documents is completely covers the practical aspects therefore it will guide the trainees to the disguised forgery, traced forgery through carbon paper, butter paper, tracing paper etc., forgery by memory, forgery by impersonation, forgery over a genuine signature, forgery by transplanting a genuine signature, forgery of rubber seals or stamps and real case studies. The security features of various documents such as PAN card, TAN card, voter ID card, driving license, UID Aadhar card, passport, stamp and e-stamp paper, banker’s cheque, QR code and Bar code.
Cyber Forensic- It is a decisive part to get a practical and professional knowledge. Practical on cyber forensics acquaint you to the cyber forensic investigation practices, case studies and so on. In the practical sessions offered for cyber forensic, participants will be made aware of various cyber threats, their legal aspects. They will also be taught about the loop-holes that may create vulnerability for one’s social security and the practices on video and audio cases.
Private Investigation- It would acquaint you with real cases such as pre-matrimonial, post- matrimonial, kidnaping, missing person etc. and the techniques required to be an investigator.
Interns duties and responsibilities:
Duties may differ, depending on present project necessities. Projects topics are usually related to Forensic Science. Trainees or interns will not execute autonomous case-work on evidence samples.
Forensic Trainer/ Forensic Expert
Supervision that will be provided by the SIFS INDIA, forensic laboratory. The internship provides an opportunity for interns to achieve hands-on practice. Interns will be performing to a variability of analytical works and will be directly mentored by Forensic Expert.
The enrolment starts with the submission of your certificates and resume. Documents must be submitted through e-mail (firstname.lastname@example.org) between January and April. Applicants will be interrogated by the project leader.
DURATION AND TIMINGS OF INTERNSHIP
The duration scheduled for the internship is 30-45 days during the summer vacations and require full day (six - eight hours) or less hours per day. Time schedule may vary depending on work and intern convenience. Usually timing can be scheduled between 9 AM to 5 PM, Monday to Saturday.
ADVANTAGES OF TRAINING
>> Internship will provide you the practical knowledge and opportunities to investigate the legal cases.
>> The internship session related to Forensic Science discipline familiarize you to brief knowledge of Forensics in classroom assembly.
>> Interns attend to plenary training session and case studies, and learn more about criminal investigation.
>> Though internship is an unpaid that does lead to temporary employment, offers interns an excellent experiences in working within a full fledge forensic laboratory.
>> It furthermore provides an opportunity to explore your career option. Gain skills and knowledge that accompaniment their academic studies, build resumes and connections with specialists in the forensic science environment.
FEE FOR INTERNSHIP
The internship or training would be payable for participants. They can avail an add-on advantages of earning scholarship on their respective course fee.
After the successful completion of internship, a valedictory function is organized on the last day where participants are distributed the certificate and a farewell treat is arranged for the participants from the Organization.
1. What is Cyber Forensic?
Cyber Forensic course completely deals with the cases related to the authenticity and admissibility of the digital evidences in the court of law, with emphasis of its legality within the grounds of Cyber Forensics.
2. What is the course content of FSP CC 104?
In the course Cyber Forensic and Ethical Hacking (FSP CC 104), students will be taught about all the investigative skills acquired to be a Digital Crime Investigator. Course will introduce you to interactive training session and practicals on the scientific and technical methods involved in a sequential examination.
For more details click on- http://www.sifs.in/classroom-course-cyber-forensic-ethical-hacking.php#
3. What is the course duration of Certificate, Diploma and PG Diploma courses?
All classroom courses are divided into three certifications i.e. Certificate course for three months, Diploma course for six months and PG Diploma for one year.
4. What qualification is required to be eligible for the above-mentioned courses?
If you are looking for Certificate and Diploma courses, you must have completed your 10+2 or appearing in any discipline from Recognized Board/ School and for PG Diploma course graduation will be required. In the admission process, self-attested mark-sheets and certificates of the previous school/college and transfer certificate along with 2 passport size photographs will be required from the student.
5. Where can I register for classroom education courses?
We provide online application form for all students. To download application, form click on- http://www.sifs.in/application-form.pdf
6. When will I receive my study materials, books etc.?
After the completion of your admission process and payment of fee, the students enrolled for classroom courses will receive you hardcopy, books and notes. After class, you will receive your notes related to your class particulars.
7. What about exams and course credits?
In the last month of your course, we will conduct your offline exam. All details regarding your exam will explain you in your period of course and the course credits differs according to course code and divided into assignment, project and exam.
For more detail please click on- www.sifs.in/ims
8. How do I get my certificate/mark-sheet, when I have completed my exams?
You will receive your mark-sheet and certificate within a month on your mentioned address by courier or you can collect your mark sheet and certificates at the study centre.
9. What is the difference between classroom and online/distance education? Which is the best mode of education?
Both modes of education are good. In the classroom mode you will get knowledge with practical way and also familiarize with the real case studies and in the other mode of education, online/distance students will get course material and eBooks related to their course code through courier. For practical and summer training session, an extra amount is charged for online/distance learning students.
10. Where do I find out what courses are being offered classroom?
We provide all information on the website- www.sifs.in ,
11. Although my degree is in an unrelated field of study, I have taken quite a few science courses. Am I eligible to apply?
Yes. You are eligible for this Cyber Forensic & Ethical Hacking (FSP CC 104), if you have completed or if you are pursuing your 10+2 or graduation in any discipline from a Recognized Board/ School/ College. All you need is a keen interest to explore the limits.
12. What is the scope and career of forensic education and related courses?
Forensic Science offers a wide range of opportunity to the students aspiring to make their careers as Forensic Scientists and Investigators. With a sense of keen observation and the ability of seeing the unseen are a few traits that would promise the aspiring students to make a colorful career in the wonderful arena of Forensic.
13. Should I pay any extra fee for examination, study materials etc.?
No. Your course fee includes Study materials, Books, Notes, I-Card, Examination Fee. You are not required to pay any extra amount, but in some cases- additional taxes / fees may apply. Summer training or internship sessions will be payable for classroom students with 15% scholarship.
14. What will I get after joining classroom course?
You will get study materials, notes and books related to your course and id-card.
15. How can I pay my course fee by credit card in USD?
Indian Students may use Universal Currency Converter from http://www.xe.com/ucc/ to pay fee in other currencies, or International students visit this link- http://www.sifs.in/onlinefee.php to check out the fee structure. You can pay your course fee from here- http://www.sifs.org.in/payment (Students enrolled for courses having course duration more than 6 months can pay their Course Fee in maximum two instalments, but Rs. 2000 will be charged extra.)
16. Why is internship important?
Internship or training is a vital part of classroom as well as online and distance students. It is intended to provide students with the opportunity to place theories into practicals. It is also very helpful to develop their skills that support professional life by preparing and encouraging them to apply their abilities and knowledge acquired through study in a work later on. So, even before the students completed their course they are trained to be job-ready, therefore increasing the student’s employment prospects.
17. Where can I apply the science of Cyber Forensic & Ethical Hacking?
SIFS INDIA provides professional course Cyber Forensic & Ethical Hacking (FSP CC 104) to acquire knowledge from the basics. There are numerous opportunities for the students enrolled in the course. A student can be appointed by any company to investigate the case related to the foul-play of confidential data and their retrieval techniques, along with the recovery and investigation of hard-disks, pen-drives and so on.
18. How can a Cyber Forensic & Ethical Hacking Investigator assist in legal proceedings?
The task of a Cyber Forensic Ethical hacking Investigator is to acquaint and assist the court of law regarding the facts and related aspects by applying his technical skills in cases related to the foul-play of data and computer-related accessories. He is liable to produce proper evidences and data before the court of law.
19. I am interested in a career in this field. Where do I start?
In order to initiate a career into this field, you should have a zeal and urge to learn the technical and investigative skills with. A certificate, diploma and PG diploma course would help you groom your knowledge theoretically as well as practically, thereby ensuring a safe and secure career.
20. What are the other specialized forensic science careers can be found outside the crime laboratory?
Other than working in the Crime Laboratory, you can also be appointed as a Crime Scene Investigator in Police Stations or you can also be appointed as an Investigator for the Mobile Forensic Laboratory. You can work as a Digital Crime Investigator in any of the fields by your technical skills and expertise.
Onel de Guzman
In 2000, a computer worm known as the ‘love bug’ attacked millions of computers after being sent through an attachment to an email entitled ‘I Love You’. Upon opening the attachment, which was masquerading as a simple text file, the worm automatically sent a copy of the email to every contact in the user’s address book which making numerous malicious changes to the user’s computer.
Computer forensic experts dissected the worm and discovered the codeword ‘Barok’ among its architecture. A professor at the AMA Computer College in the Philippines recognised the codeword, having seen it in a program submitted as an assignment by student Onel de Guzman. Police searched Guzman’s apartment and discovered discs relating to the Love Bug’s creation, implicating Guzman as the perpetrator.
Unfortunately laws against computer hacking were not brought into power until June that year, slightly too late, allowing Guzman to go unpunished for his crime.
All these courses are Online / Distance mode. Each student can access their course module by login our online study portal i.e.
Apart from above course details, there are some additional details of this course. More details can be get by clicking here such as-
1. Eligibility for the Admission
2. Admission Procedure
3. Examination Pattern
4. Grading System in Examination
5. Course Fee and Concession
6. Types of Certificates
7. Study Materials
For further Course details Click Here-->>
2443, Hudson Lane, Kingsway Camp, Delhi-09
Telephone: +91 11 47074263