Law Enforcement


Forensic experts in Law enforcement agencies who want to extend their knowledge and experience to forensic analysis of digital devices such as hard disk ,computers ,mobiles phones, laptops can learn from us by attending training programs specially designed for Law enforcement and federal agencies.

Our training and workshops will cover the following modules of cyber security & digital forensics

    Module I : DISK FORENSICS


    A session on Disk Forensics will train the attendees on fundamentals of storage media, how to image them and how to extract deleted information from such devices . This session can be attended by anyone who is new to digital forensics and wish to gain more insight on how to deal with cases involving storage devices such as hard disks, USB Sticks, CD/DVDs in following topics.
    Topics
  • Digital storage media fundamentalsForensics
  • Standard operational procedures for evidence handling at a crime scene
  • Chain of custody
  • ACPO guidelines on Digital Investigation
  • Recovery of deleted data from storage devices
  • Live Case Studies and Scenarios
  • Password recovery and cracking
  • Imaging of storage devices using industry standard methodologies
  • E-mail tracking & tracing
  • Module II: SMARTPHONE FORENSICS


    Smartphone Forensics is designed for participants who are both new to and experienced with mobile device forensics. The course provides the core knowledge and hands-on skills that a Digital Forensic Investigator needs to process Smartphone and other mobile devices.
    Topics
  • Mobile forensics fundamentals
  • Potential sources of evidence in mobile devices
  • Mobile phone imaging
  • Logical and Physical extractions
  • Extracting call logs, sms and chats from mobile devices
  • Recovery of deleted files
  • SIM Card Data Extraction
  • Android Forensics
  • I-Phone Forensics
  • MODULE III: CDR AND LINK ANALYSIS


    This session is highly beneficial for participants who wish to learn how call data records can play a major role in any investigation in identifying a suspect. Based on a suspect's calling behavior, we may be able to discover a suspect's activity, his current and commonly travelled locations or find out about his close associates, thus providing invaluable leads in any investigation.
    Topics
  • Introduction to Call data records
  • Analysis of CDR and Tower dumps
  • Determining current locations and movement of the suspects
  • Live case scenarios