• Post category:StudyBullet-13
  • Reading time:9 mins read


Cyber Forensics Investigator

What you will learn

You will become an expert in the field of cyber security.

The course focuses on the latest technologies

Need of Skilled Manpower in this field is also increasing

Very useful for Students seeking a career in Technology etc. Helpful for Academics

Description

What will students learn in your course ?
The fundamental principles of network and information security, as well as potential threats and weaknesses, will be thoroughly examined in this course. It has been divided into one module and four chapters for the sake of understanding. When the term “computer forensics” is used to refer to the application of investigation and analytical techniques to gather and preserve evidence from a specific computing device in a manner that is appropriate for presentation in court, the term “computer forensics” means “computer evidence collection and preservation.” When it comes down to it, the ultimate goal of computer science is to conduct a structured inquiry while simultaneously keeping a recorded chain of evidence in order to determine exactly what happened on a computing device and who was responsible for it.  Following the first chapter on networking foundations, which will be examined in detail, the second chapter will cover information security, followed by the third chapter on security threats and vulnerabilities, and the fourth chapter will cover cryptography and encryption. You will get the opportunity to gain practical experience. You will also get knowledge that is theoretical in nature. If you take this course, you will have a clear understanding of security concepts. An internationally acclaimed speaker, the instructor of this course has delivered and performed thousands of cyber awareness campaigns to promote cyber hygiene and reduce the number of fraudulent transactions conducted online.


Get Instant Notification of New Courses on our Telegram channel.


English
language

Content

Introduction

Introduction
Circuit Switching
Packet Switching
Virtual Circuit
Services to be supported and data ra
Flow Control
Error Detection
Variations in operation
Summary

Section 2

Introduction
Disadvantages of Wireless Network
Categories of Wireless Network
Wireless Local Area Network
Wireless Local Area Network 2
Wireless LAN Standards
Wireless Personal Area Net
Wireless Metropolitian Area Net
Wireless Metropolitian Area Net 2
Summary

Section 3

Introduction
The Internet Architechture
Domain Name System
Domain Name System 2
Internet Service Provider
Internet Access Product
Summary

Section 4

Introduction
Access Attack
Modification Attack
Regulation & Summary

Section 5

Introduction
Detection
Recovery

Section 6

Introduction
Network Infrastructure
User’s Concern
Service Provider’s Concern
Security Services
Summary

Section 7

Introduction
Criminal’s Tactics
Digital Evidance
Router Forensics
Summary

Section 8

Introduction
Terminology
Cover Document Audio
Cover Document Image Video
Stegano Analysis
Attacks
Security threats in the era of convergence
Summary

Section 9

Introduction
Vulnerabilities
Threats
Threats 2
Exploiting Vulnerabilities
Summary

Section 10

Introduction
Passwords
Social Engineering
Password Cracking
Proactive Password
Summary

Section 11

Introduction
IP Spoofing
Common Ports Vulnerable to Attacks
Summary

Section 12

Introduction
Virus
Worm
Code Red
Trojan Horse Program
Logic Bomb
Summary

Section 12.1

Introduction
System Software Bugs
Application Software Bugs
Buffer Overflow
Summary

Section 13

Introduction
Cyber Terrorism
Summary

Section 14

Introduction
Surveillance of Internet
Surveillance of Radio
Summary

Section 15

Introduction
Terminology
Security Services Provided by Cryp
Public Key Encryption
Attacks on Cryptographic Systems
Methods used by Attackers

Section 16

Introduction
RSA based digital signature
Summary

Section 17

Introduction
Key Generation
Key Exchange
Digital Certificate
X.509 Certificate
Certificate Revocation
Summary

Section 18

Introduction
Cryptography in user Authentication
Application Lawyer
Transport Layer Security
Security at IP Layer
Summary