Certified Digital Forensics Investigator


The Certified Digital Forensics Examiner program is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation.

Benefits of this Course:

The CDFI course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence. An example of "corrective action" would be the termination of an employee for a violation of computer usage where digital evidence was needed to support the allegation. The investigator must furnish an irrefutable burden of proof based on that digital evidence.

  • Forensics Science
  • Computer Forensics
  • Why and When Do You Use Computer Forensics?
  • Understanding architecture of operating systems
  • IT Amendments
  • IT Acts 2000
  • Analyzing the Constitutional Validity of Section 91 Crpc
  • Cyber Law
  • FIR as per Cyber Law
  • Generating Report Draft as per FIR
  • Need for Compute Forensics
    1. a.Goals of Forensics Readiness
      b.Forensics Readiness Planning
      c.Disruptive Incidents to the Business
      d.Cost Expenditure Responding to the Security Incident
  • Types of Expert Witnesses
    1. a.Computer Forensics Experts
      b.Role of Computer Forensics Expert
      c.Medical & Psychological Experts
      d.Civil Litigation Experts
      e.Construction & Architecture Experts
      f.Criminal Litigation Experts
  • First Responder Procedures
    1. a.Electronic Evidence
      b.First Responder
      c.Roles of First Responder
      d.Electronic Devices: Types and Collecting Potential Evidence
  • Forensic Tools
    1. a.FTK
      d.DVR Examinar
      e.Magnetic examine
      g.MD vedio
      k.Oxygen forensic
      m.MD seris
  • CelleBrite
    1. a.UFED System
      b.UFED Physical Pro
      c.UFED Ruggedized
  • Cyber Crime Investigation
    1. a.Key Steps in Forensics Investigation
      b.Rules of Forensics Investigation
      c.Need for Forensics Investigator
      d.Collect the Evidence
      e.Data Recovery Software
  • Role of Forensics Investigator
    1. a.Accessing Computer Forensics Resources
      b.Role of Digital Evidence
  • Corporate Investigations
    1. a.Understanding Corporate Investigation
      b.Legal Issues
      c.Person Assigned to Report the Crime
      d.Who to Contact at the Law Enforcement?
  • Investigating Computer Crime
  • Before the Investigation
  • Build a Forensics Workstation
  • Building the Investigation Team
  • People Involved in Computer Forensics
  • Review Policies and Laws
  • Forensics Laws
  • Notify Decision Makers and Acquire Authorization
  • Risk Assessment
  • Build a Computer Investigation Toolkit
  • Steps to Prepare for a Computer Forensics Investigation
  • Computer Forensics Investigation Methodology
  • Obtain Search Warrant/Example of Search Warrant
    1. a.Searches Without a Warrant
      b.Evaluate and Secure the Scene
      c.Forensics Photography
      d.Gather the Preliminary Information at the Scene
      e.First Responder
  • Acquire the Data
    1. a.Duplicate the Data (Imaging)
      b.Verify Image Integrity
      c.MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
      d.Recover Lost or Deleted Data
      e.Data Recovery Software
      f.Analyze the Data
      g.Data Analysis
      h.Data Analysis Tools
  • Assess Evidence and Case
    1. a.Evidence Assessment
      b.Case Assessment
      c.Processing Location Assessment
      d.Best Practices to Assess the Evidence
  • Prepare the Final Report
    1. a.Documentation in Each Phase
      b.Gather and Organize Information
      c.Writing the Investigation Report
      d.Sample Report
  • Testifying as an Expert Witness
    1. a.Expert Witness
      b.testifying in the Court Room
      c.Closing the Case
      d.Maintaining Professional Conduct
      e.Investigating a Company Policy Violation
      f.Computer Forensics Service Providers
      g.Collecting Evidence from RAM
  • MD5 Calculation
    1. a.Message Digest Function: MD5
      b.Why MD5 Calculation?
      c.MD5 Hash Calculators: HashCalc,
      d.MD5 Calculator and HashMyFiles
      e.MD5 Checksum Verifier
  • Metadata Investigation
    1. a.Metadata
      b.Types of Metadata
      c.Metadata in Different File Systems
      d.Metadata in PDF Files
      e.Metadata in Word Documents
      f.Tool: Metadata Analyzer
  • Log Capturing and Event Correlation
    1. a.Computer Security Logs
      b.Computer Security Logs
      c.Operating System Logs
      d.Application Logs
      e.Security Software Logs
      f.Router Log Files
      g.Honeypot Logs
  • Recovering Deleted Files and Deleted Partitions
    1. a.Deleting Files
      b.What Happens When a File is Deleted in Windows?
      c.Recycle Bin in Windows
      d.Storage Locations of Recycle Bin in FAT and NTFS System
      e.How the Recycle Bin Works
      f.Damaged or Deleted INFO File
      g.Damaged Files in Recycled Folder
      h.Damaged Recycle Folder
  • Collect the Evidence
    1. a.Collect Physical Evidence
      b.Evidence Collection Form
      c.Collect Electronic Evidence
      d.Guidelines for Acquiring Evidence
  • Secure the Evidence
    1. a.Evidence Management
      b.Chain of Custody
      c.Chain of Custody Form
  • Searching and Seizing Computers without a Warrant
    1. a.Post-Seizure Issues
      b.Searching Computers Already in Law Enforcement Custody
      c.The Permissible Time Period for Examining Seized Computer


  • Course Duration: 2 Months

Who should attend ?

  • All students who use computers and Internet for their personal or academic work
  • College students for Industrial training.
  • Students from any stream can attend this training.
  • Students who want to make their career in Information Security and Ethical Hacking.
  • Staff and Employees of colleges/school can join this training to live more secure from various attacks.

Things required for Online Training

  • Laptop or Desktop (Os: Win7 / Win8 / Mac)
  • Internet Connection (Speed: min. 25mbps)
  • Headphones with mic

Key Take

  • Hacking and Security Tools, Books, Tutorials to each student
  • Training by White Hat Hackers, Ethical Hackers, and Information Security Experts
  • Covers both sides of the coin - Attacks and Counter measures
  • Live training on pre attacks with their Counter measures, Hands on use many technical tools