Star Forensic Investigator Computer Hacking

Star Forensic Investigator Computer Hacking (SFICH – 007) is a detailed course that explains the intricacies of a cybercrime and helps deduce its origin.

The program helps the learners acquire a fundamental understanding of tools and techniques to conduct forensic investigations, detailing all aspects of digital forensics from detecting an intruder’s footprints, to take necessary preventive steps, and to properly gather and process the evidence to prosecute in the court of law. The course aims to teach the learners about various investigation tools, eDiscovery, digital evidence collection, evidence preservation, e-mail investigation and recovery, e-mail and IP tracking, encryption and decryption methods, search and seizure of computers, recovering deleted evidences and password cracking.

  • 24 hrs of classroom / instructor-led training
  • Accredited Instructor with industry experience
  • Authorized Coureware
  • Case Studies & real-world examples
  • Practical Labs
  • End of chapter quizzes and simulation exams
  • Certification exam included


  • EHE (Ethical Hacking Expert)
  • Network Operation Center (NOC)
  • Security Operational Center (SOC)
  • Cyber Crime Officer
  • Cyber Crime Investigator
  • Defense and Military
  • e-business Security Professionals
  • System Administrator
  • Legal professionals
  • Banking, insurance and other professionals,
  • Government Agencies
  • IT Managers
  • Government Agencies etc., 

After completing this course, you will be able to:

  • Identify types of digital evidence
  • Recover lost files and partitions on different OS platforms
  • Carry out computer forensics process
  • Capture and manage logs
  • Apply different investigating techniques to solve attacks on network, cloud and virtual systems
  • Perform e-mail crime investigation
  • Investigate attacks on mobile devices
  • Use forensic tools and preparing documentations

Module 1: Introduction to Computer Forensics
Module 2: Introduction to Digital Evidence
Module 3: Understanding Hard Disks
Module 4: File Systems: Windows, Linux and Mac OSX
Module 5: Computer Forensics Investigation Process
Module 6: Searching and Seizing

Module 7: Data Acquisition and Duplication
Module 8: Understanding Incident Response Procedures
Module 9: Forensics and Operating Systems
Module 10: Steganography: An Overview
Module 11: Investigating Email Crimes

Module 12: Network Forensics
Module 13: Investigating Web Attacks
Module 14: Mobile Forensics
Module 15: Cloud Forensics
Module 16: Virtualisation and Forensics
Module 17: Database Forensics
Module 18: Dealing with Anti-Forensics Techniques
Module 19: Malware Forensics
Module 20: Digital Forensic Investigation Using Encase Forensic
Module 21: Forensics Report Writing

  • Minimum 2 years of experience in security and Forensic

Format: Closed-book
Delivery: Online
Questions: 100 multiple choice questions
Passing Score: 70%
Duration: 180 Minutes

    • High-impact learning with case studies
    • Delivered by certified instructors
    • Targeted learning for real projects

    Check Schedule

    Fill this form below and our executive will get in touch with you shortly

    Share with your friends

    Why Consuldesk

    Certified and Experienced Instructors

    Post Training Support

    Customized Training

    Flexible Schedule

    Access to Recorded Sessions

    Choose your preferred Learning Mode

    1 to 1 Training

    Customised Schedule
    Learn at you dedicated hour
    Instant Clarification of doubt

    Online Training

    Flexibility, Convenience & Time Saving
    More effective
    Economical Learning

    Corporate Training

    Anytime, Anywhere – Across the Globe
    Hire a Trainer at your own pace
    Customised Training

    Looking for a customized training?

    Share with your friends