← Back to Training Programs
Training Program

Cyber & Digital
Forensics

Complete training track for security fundamentals, investigation workflow, and practical digital forensics.

4 Phases
Beginner → Intermediate
15 Modules
80+ Notes
Lab-driven practice
Defensive mindset
Incident workflow
Report writing

Curriculum

Core Modules

01

Introduction to Cyber Security

Core concepts of cybersecurity, threat landscape, attack vectors, and defensive frameworks.

02

Fundamentals of Digital Forensics

Principles of digital forensics, evidence lifecycle, and forensic methodology overview.

03

Cyber Crime Investigation

Types of cybercrime, investigation procedures, jurisdictional aspects, and case management.

04

Computer & Disk Forensics

File system analysis, disk imaging, deleted file recovery, and storage media examination.

05

Memory (RAM) Forensics

Volatile memory acquisition, process analysis, and artifact extraction using Volatility.

06

Network Forensics

Packet capture, traffic analysis, log correlation, and network intrusion investigation.

07

Mobile Device Forensics

iOS and Android acquisition, app data extraction, call logs, and mobile artifact analysis.

08

Email & Internet Forensics

Email header analysis, browser forensics, web cache examination, and phishing investigation.

09

Malware Analysis for Investigators

Static and dynamic analysis techniques, sandbox tools, and identifying malicious indicators.

10

Social Media & OSINT Investigation

Open-source intelligence gathering, social media profiling, and digital footprint analysis.

11

Cloud Forensics

Evidence acquisition from cloud platforms, log analysis, and container forensics basics.

12

Cryptocurrency & Dark Web Investigation

Blockchain tracing, wallet analysis, dark web monitoring, and crypto-crime investigation.

13

Incident Response & Threat Hunting

IR lifecycle, threat hunting methodologies, containment strategies, and playbook development.

14

Cyber Law & Digital Evidence Handling

IT Act 2000, IPC provisions, admissibility of digital evidence, and legal compliance.

15

Digital Forensic Report Writing & Courtroom Testimony

Technical report structuring, expert witness preparation, and presenting evidence in court.

Tools You'll Use

AutopsyDisk
FTK ImagerAcquisition
VolatilityMemory
WiresharkNetwork
NetworkMinerNetwork
Cellebrite / AndrillerMobile
MaltegoOSINT
ShodanOSINT
GhidraMalware
VirusTotalMalware
TheHiveIR
SplunkLogs
Blockchain ExplorerCrypto
OSINT FrameworkOSINT

Plus: sample case files, triage checklists, acquisition guides, and report templates.

Program Outcomes

Acquire and preserve digital evidence from disks, memory, and mobile devices

Investigate cybercrime cases including malware, phishing, and crypto fraud

Perform OSINT and social media investigations using industry tools

Conduct network and cloud forensics with packet and log analysis

Apply cyber law principles and handle digital evidence for court

Write professional forensic reports and deliver expert witness testimony

Schedule

Learning Roadmap

Phase 1

Security fundamentals, networking basics, and lab environment setup

Phase 2

Endpoint forensics, log analysis, and triage exercises

Phase 3

Network forensics, packet capture, and traffic reconstruction

Phase 4

Incident response workflow, case report writing, and final lab

Phase Structure

Each phase includes concept sessions, guided labs, case-style assignments, and a short reflective report.

Ready to Begin?

Pair this training with our Courses for exam-specific preparation.