Cyber Forensics Workshop
This workshop is dedicated on Cyber Forensics & Crime Investigation Techniques. Computer Forensics is a detailed and scientific study, research and implementation of computer science subjects for gathering the digital evidence in cases of cyber crimes or for other scientific research purposes also it introduces the current needs of the cyber security sector.
This workshop will also provide an introduction to the expanding field of computer crime investigations and computer forensics. It is designed to train investigators in electronic discovery and the fundamentals of conducting an effective computer forensic examination. It examines, in depth, current, relevant research and provides attendees participation in labs that are designed to train government, corporate, military and law enforcement investigators to conduct legally approved forensics methodology for electronic and digital evidence gathering.
Workshop Topic & Details :-
1. Investigation Process:
How law enforcement agencies can do their work, how it works in the forensic environment and which kind of persons are their to work on cases.
2. Disk Forensics (Deleted Data Recovery):
Deleted data recovery is the thing which everyone need, when important data is being deleted. When it comes to forensics and live data analysis it is mandatory to recover the deleted data first and then we have to work on analysis part regarding the case.
3. Email Forensics:
It is used to check the legitimate user, if we find any suspicious email activity then we can use this kind of techniques to get the idea about the hackers.
4. IP Address Tracking Techniques:
This method is very useful to track and caught the suspects. It also gives the information about the ISP and we can get the actual location from the ISP.
5. Memory Forensics:
In this we will Capture the RAM and do analysis to find the evidences and artifacts.
6. Windows Forensics (Registry Analysis) (Event Viewer):
Deeper understanding of the Registry and the wealth of information regarding recently accessed files and considerable information about user activities. All of this can be extremely valuable, depending on the nature of the case you’re working on. Display information about the kernel, device drivers, services, Security Accounts Manager (SAM), and user interface and much more.
7. Browser Forensics:
Digging the web browser is all about to get the whole data and information from it. From forensics view it is used to get the data like cookies, cache files, login data, downloads, bookmarks, history, and all. Form this information we can also do the interrogation of suspect.
8. User Activity Tracing(Prefetch files, Recently used files, Jump List, ADS):
By monitoring the user activity, we can identify the last activity done by any person, like what he/she have accessed in last few hours, which kind of software is being used and all.
Also check out other Business Events in Ahmedabad, Workshops in Ahmedabad.
Liked this event? Spread the word :