Cyber & Digital
Forensics
Complete training track for security fundamentals, investigation workflow, and practical digital forensics.
Curriculum
Core Modules
Introduction to Cyber Security
Core concepts of cybersecurity, threat landscape, attack vectors, and defensive frameworks.
Fundamentals of Digital Forensics
Principles of digital forensics, evidence lifecycle, and forensic methodology overview.
Cyber Crime Investigation
Types of cybercrime, investigation procedures, jurisdictional aspects, and case management.
Computer & Disk Forensics
File system analysis, disk imaging, deleted file recovery, and storage media examination.
Memory (RAM) Forensics
Volatile memory acquisition, process analysis, and artifact extraction using Volatility.
Network Forensics
Packet capture, traffic analysis, log correlation, and network intrusion investigation.
Mobile Device Forensics
iOS and Android acquisition, app data extraction, call logs, and mobile artifact analysis.
Email & Internet Forensics
Email header analysis, browser forensics, web cache examination, and phishing investigation.
Malware Analysis for Investigators
Static and dynamic analysis techniques, sandbox tools, and identifying malicious indicators.
Social Media & OSINT Investigation
Open-source intelligence gathering, social media profiling, and digital footprint analysis.
Cloud Forensics
Evidence acquisition from cloud platforms, log analysis, and container forensics basics.
Cryptocurrency & Dark Web Investigation
Blockchain tracing, wallet analysis, dark web monitoring, and crypto-crime investigation.
Incident Response & Threat Hunting
IR lifecycle, threat hunting methodologies, containment strategies, and playbook development.
Cyber Law & Digital Evidence Handling
IT Act 2000, IPC provisions, admissibility of digital evidence, and legal compliance.
Digital Forensic Report Writing & Courtroom Testimony
Technical report structuring, expert witness preparation, and presenting evidence in court.
Tools You'll Use
Plus: sample case files, triage checklists, acquisition guides, and report templates.
Program Outcomes
Acquire and preserve digital evidence from disks, memory, and mobile devices
Investigate cybercrime cases including malware, phishing, and crypto fraud
Perform OSINT and social media investigations using industry tools
Conduct network and cloud forensics with packet and log analysis
Apply cyber law principles and handle digital evidence for court
Write professional forensic reports and deliver expert witness testimony
Schedule
Learning Roadmap
Phase 1
Security fundamentals, networking basics, and lab environment setup
Phase 2
Endpoint forensics, log analysis, and triage exercises
Phase 3
Network forensics, packet capture, and traffic reconstruction
Phase 4
Incident response workflow, case report writing, and final lab
Phase Structure
Each phase includes concept sessions, guided labs, case-style assignments, and a short reflective report.
Ready to Begin?
Pair this training with our Courses for exam-specific preparation.