Module 1: Emerging Threat Landscape of Cyber Crimes

  • Emerging Threat Landscape of Cyber Crimes
  • Quiz to Chapter 1

Module 2: Introduction to Computers

  • Introduction to Computers
  • Quiz to Chapter 2

Module 3: Drafting a Report & Information Gathering

  • Drafting a Report & Information Gathering
  • Quiz to Chapter 3

Module 4: Introduction to Social Media & Banking Frauds

  • Introduction to Social Media & Banking Frauds
  • Quiz to Chapter 4

Module 5: Cyber Laws

  • Cyber Laws
  • Quiz to Chapter 5

Assessment & Certification

  • Course Completion Examination
  • Course Completion Certificate

 Module 1: CDR, IPDR & Tower Dump Analysis – Theory

  • CDR, IPDR & Tower Dump Analysis – Theory
  • Quiz to Chapter 1

 Module 2: Hard Disk Geometry

  • Hard Disk Geometry
  • Quiz to Chapter 2

 Module 3: Introduction to File Systems

  • Introduction to File Systems
  • Quiz to Chapter 3

 Module 4: File Extensions & File Signatures

  • File Extensions & File Signatures
  • Quiz to Chapter 4

 Module 5: Introduction to Hashing and Imaging

  • Introduction to Hashing and Imaging
  • Quiz to Chapter 5

 Module 6: Metadata Analysis Theory

  • Metadata Analysis Theory
  • Quiz to Chapter 6

 Module 7: Log Analysis

  • Log Analysis
  • Quiz to Chapter 7

 Module 8: Registry Forensics

  • Registry Forensics
  • Quiz to Chapter 8

 Module 9: Introduction to Encryption and Decryption Technique

  • Introduction to Encryption and Decryption Technique
  • Quiz to Chapter 9

 Module 10: Windows System Artefacts

  • Windows System Artefacts
  • Quiz to Chapter 10

 Module 11: DNS Abuse and Criminal Usage

  • DNS Abuse and Criminal Usage
  • Quiz to Chapter 11

 Module 12: Browser Forensics

  • Browser Forensics
  • Quiz to Chapter 12

 Module 13: Removable Storage Media Forensics

  • Removable Storage Media Forensics
  • Quiz to Chapter 13

 Module 14: Introduction to Deepweb and Darkweb

  • Introduction to Deepweb and Darkweb
  • Quiz to Chapter 14

 Module 15: Introduction to OSINT and SOCMINT

  • Introduction to OSINT and SOCMINT
  • Quiz to Chapter 15

 Module 16: Network Forensics

  • Network Forensics
  • Quiz to Chapter 16

 Module 17: Introduction to Malware Analysis

  • Introduction to Malware Analysis
  • Quiz to Chapter 17

 Module 18: Cloud Computing and Cloud Forensics

  • Cloud Computing and Cloud Forensics
  • Quiz to Chapter 18

 Module 19: Introduction to Virtualization

  • Introduction to Virtualization
  • Quiz to Chapter 19

 Module 20: Introduction to Blockchain and Cryptocurrency

  • Introduction to Blockchain and Cryptocurrency
  • Quiz to Chapter 20

 Module 21: Introduction to Password Cracking Concepts

  • Introduction to Password Cracking Concepts
  • Quiz to Chapter 21

 Module 22: Introduction to Internet of Things

  • Introduction to Internet of Things
  • Quiz to Chapter 22

 Module 23: Anti-Forensics

  • Anti-Forensics
  • Quiz to Chapter 23

Assessment & Certification

  • Course Completion Examination assed
  • Course completion certificate

  • Banking Frauds
  • Online Dating Sites Frauds
  • Social Media Frauds
  • ATM Frauds
  • SIM Card Frauds
  • Online Wallet Fraud

 Module 1: Introduction & Importance of Finger Print

 Module 2: History of Fingerprints

 Module 3: Some Interesting Cases Solved Through Finger Print

 Module 4: Taking of Fingerprint

 Module 5: Patterns & Core-Delta Identification

 Module 6: Different Components of A Classification Formula & Ridge Characteristics

 Module 7: Type of Prints

 Module 8: Scene of Crime Visit

 Module 9: Automation in Finger Prints

 Module 10: Comparison, Evidence and Laws of Finger Print

Assessment & Feedback