Digital Forensics and Cyber-Crime Investigation

Computer Forensics

(120 ratings)



30-Day Money-Back Guarantee

This course includes:

What you'll learn



Please, before reading the Description, watch the Promo Video, for a better understanding.

I hope you have watched the Promo Video!

So let me start with the Description…

Are You Ready To Take Your Cyber-Crime Investigation Skills To The Next Level?

It is my great pleasure to welcome you all to Digital Forensics and Cyber-Crime Investigation Course.

I’m delighted to see you here. And a special welcome to those of you who are in the Digital Forensics and Cyber-Crime field for the first time.

I Afrozulla Khan, Welcome You All To

Digital Forensics & Cyber-Crime Investigation Course!

You will have knowledge of these topics after completing this course, Digital Forensics and Examination, Reasons for performing Digital Forensics, Types of Digital Forensics, Searching for evidence and Digital Footprints on the Seized Computer, Methodologies of Acquisition and Seizing Digital Devices, Knowledge of Windows Forensics, Volatile and Non-Volatile Information Gatherings, Forensic Analysis of RAM Dump, Recover Deleted Files, Steganography Analysis, Multimedia Forensics, and Anti-Forensics Techniques used by Hackers to erase the evidence.

BONUS (Endless Benefits)

It will take you only four hours to learn my course and put it to use in your investigation!

My Course is so easy to understand that you’ll wonder if it’s the soulmate you were searching for all along!

You might have a lot of courses available on your hands and you probably always will, but not taking the right course to upgrade your skills and knowledge will be a loss.

Allah Hafiz!

This is Afrozulla Khan, signing off!

Who this course is for:

  • People who have no experience with Digital Forensics and Cyber-Crime, and want to learn it.
  • People who want to learn how to perform Computer Forensics Investigation.
  • People who want to enhance their skills in Digital Forensics and Cyber-Crime.

Course content

9 sections • 27 lectures • 4h 14m total length

  1. Digital Forensics
  2. Process of Digital Forensics
  1. Maintaining Integrity
  2. Maintaining Chain of Custody
  3. Write Blocker
  1. Installing FTK Imager
  2. Copying and Imaging of Storage Device
  3. Search for files and Recover Deleted Files after Acquisition
  1. OS Forensics – Find Artifacts in Windows
  2. RAM Dump
  3. Ram Dump Analysis
  1. Find Browser History and other Evidences
  1. Procedure of Creation and Detection of Steganography – With Tool
  2. Procedure of Creation and Detection of Steganography – Without Tool
  3. Image Forensics (Metadata)
  1. Forensics v/s Anti-Forensics
  2. Anti-Forensics Techniques
  3. Image Forensics (Manipulation of Metadata)
  1. File Extensions
  2. Website Crime Investigation
  3. Guidelines for collection of PC
  4. Guidelines for Receiving The Case In The Laboratory
  5. Guidelines General Packing, Store and Transportation of Evidence
  6. Case Forwarding Performa for Forensic Examination
  7. Scope of Forensic Science in India
  8. Forensic Expert Report



Forensic Expert & Cyber-Crime Investigator

Afrozulla Khan is a Founder of Nyayik Vigyan, owner of Forensic Science Application, Certified Cyber Warrior, self-taught Cyber-Crime Investigator, Researcher, and has helped individuals and police officials in dealing with cyber-crime cases.

He has prior working experience in cyber-crime with qualifications as Masters in Criminology & Forensic Science.

He serves as a research paper reviewer for the International Journal of Forensic Science, Medwin Publishers.

He serves as an Editorial Board Member for the Journal of Forensic Sciences and Criminal Investigation (JFSCI), Juniper Publishers.

He is Editor-In-Chief in Nyayik Vigyan Articles of Forensic Research and Criminal Investigation (NVAFRCI) at Nyayik Vigyan Research & Publication Group.

He conducts Forensic Science and Cyber-Crime awareness programs among police officials, school-college students, and bank officials, etc.

You cannot copy content of this page