Computer Forensics

Course Objectives

  • Describe the importance of Computer forensics in detail
  • Elaborate on the windows registry and boot process
  • Apply forensic investigation process for any issue that occur in IT security
  • Apply the laws related to computer forensics process and cyber act


Learning Outcomes

  • Identify the importance of computer forensics so that it can be used wherever required
  • Recognize the necessity of storage and data recovery in computer forensics
  • Interpret the evidences you get from forensic investigation
  • Infer the legal rules which are already defined in the cyber laws


Who Should Attend?

  • Graduates from IT background
  • IT Professionals


Learning Access

  • Handbooks
  • Lecture Slides
  • Videos
  • Quizzes
  • Online Lab

 

 Course Duration

12 Weeks / 40 Hours

 

Examination

Exam Duration

90 Minutes

Number of Questions

45

Total Marks

100

Types of Questions

Multiple Choice Questions

Pass Percentage

50% (min)

Exam Pattern

Completely Online

 

Certification

After completing this course and successfully passing the certification examination, the student will be awarded the    “Certified in Computer Forensics Professional” certification.


If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'


  • Introduction to Computer Forensics
  • Investigation Procedure and Response
  • Storage Devices
  • Data Recovery Methods
  • Forensics Investigation Techniques
  • Password Cracking Mechanism
  • Importance of Cyber Laws
  • The Cyber Act


  • 40 hours of high-quality eLearning
  • 12 Hrs Face to face delivery
  • High Student Engagement Platform - KRACKiN
  • Student e-Portfolio
  • Project/Case studies
  • Hands-on exercises
  • End module assessments
  • Dedicated Learning Advisors for training
  • 24x7 Online LMS

After the successful completion of this course, applicants can look for opportunities as:

  • Manager-IT Process Assurance
  • Manager Forensic and Incident Response
  • Lead Cyber Defense Analyst
  • Security Service Analyst
  • Cyber security practice Lead
  • Lead Cyber Analyst

Request A Call