Cyber Forensics & Investigations

Learn Depths of Cyber Crime Investigations and Forensics and find out evidences for legal  Proceedings

Register Here for Attractive Discounts

Cyber Forensics

  • Training Type
  • Online Training

No Travel

Low Cost

Expert Guidance

Software Toolkit

Doubt Forum

Authentic Certificate

No Travel

Low Cost

Expert Guidance

Software Toolkit

Doubt Forum

Authentic Certificate

What's Inside the Course

  • What is Cyber Forensics
  • Scope of Cyber Forensics
  • Chain of Custody
  • Expert Witness
  • Ethics for Experts
  • Evidence Storage
  • Corporate Investigation vs Legal Investigation
  • Why Corporate Investigation?
  • Preparing for Investigation
  • Validating data Under Linux
  • Validating Data Under Windows
  • Image Acquisition
  • Evidence Analysis
  • Evidence Analysis
  • Data Recovery & Analysis
  • Last Activity View
  • Internet History Analysis
  • Network Acquisition
  • Packet Analysis
  • Evidence Hunt
  • Santoku Overview
  • Android Rooting
  • Image Acquisition
  • Mobile Memory Analysis
  • Evidence
  • Crimes on Facebook
  • Information Gathering
  • Facebook Log Request
  • Evidence Collection
  • Introduction to End to End Encryption
  • Whats-app Memory Acquisition
  • Recovering all Deleted Conversations
  • Evidence Collection

Writing Reports of all evidences collected

Students will practice on dummy cases investigations

Meet The Trainers

Harminder Singh

Cyber Security & Forensics Investigator

Harminder Singh is a award winning speaker having more than 7 years of experience in Cyber Crime Investigation and forensics. He worked as consultant to Delhi,Ratnagiri,Amritsar Cyber Cell during early days of his career. He has solved more than 44 cases including Biggest Data theft Cases, Cyber Espionage cases, Phishing cases,Credit card Fraud Cases and many others.

Surender Dabur

Network & Information Security Analyst

Young and dynamic personality of Mr. Surender Dabur has played an important roles in building his strong relationship in his work. He solved many cases of Internet Banking Fraud and Online tracking. He is working for 20 companies as a Cyber Security and Forensic Investigation Trainer. . He is working for the betterment of Indian Security Systems.

What Our Students Say

It was nice experience for me to attend your training. faculties are too good in their field they taught us how to stay safe and secure on internet and how use devices in a secure way.
Dheeraj Jha
Student @ VSICS Kanpur
"After attending this training I got a great addiction to Cyber Forensics. I learnt more than I expected. Hoping to learn more from you guys. Once again,thank you very much "
Akhil Rko
Student @ BITS Pilani
"Their lectures are awesome,easy to understand,and any one will never get bore.This is all due to his art of teaching.They firstly use to develop curiosity before starting of topic as a result of which students pay more attention toward them."
Tirupati Raman Mishra
Student @ JK Institute of Applied Physics and Technology
“They teaches as a friend and also explains as a teacher. Their classes are so interesting and enjoyable and the knowledge they impart is practical and useful. Thank you Axpino Technologies for this Opportunity"
Sarvagya Gupta
Merchant Navy

We are Trusted by The Best Institutes in The Country



IIT Kharagpur

IIT Bhubanehswar


IIT Hyderabad


IIT Roorkee

IIT Kanpur

BITS Pilani

Register Here and Get Attractive discounts

Cyber Forensics

  • Training Type
  • Online Training

You May Also Like to Join

Network Penetration Testing

With comprehensive coverage of tools, techniques, and methodologies for network penetration testing, Axpino truly prepares you to conduct high-value penetration testing projects step by step and end to end.


Kali Linux

This course introduces ethical hackers and penetration testers to Kali Linux. This course will show IT professionals how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux.

Hacking & Securing Websites

Learn to use latest methodologies to test a web App vulnerability and find out latest remedies. we will take you on a wild and fascinating journey into the cyber security discipline of web application pentesting. This is a very hands-on course with lots of practical stuff.

Frequently Asked Questions

Our online training is real time virtual classroom based training. You will be able to see and interact with our trainer live on your screen. 

Before joining the classes you must have a smartphone/laptop/desktop or any smart device with internet where you can access our live classes.

Toolkit is a set of all the software and tools which will be used throughout the training. 

You will get the link to download all the tools just after the completion of your registration process

Unlike other certifications you will get the certificate after completion of the course which can be authenticated and verified on our website by any person or company

The duration for this course is 20 hours i.e 10 Days. We will be having 10 regular classes 2 hours a day

In case you miss any class. We will Reschedule a backup class for you.

You can ask your doubt during class as you can interact with the trainer directly and also you will have access to our doubt forum where you will be able to post your doubts and trainer will reply you over there.

As we know it is difficult to handle large batch size in a online class, we are keeping a very minimal batch size of 10 students.

© 2014 Axpino Technologies


Verify Certificate
Complains & Suggestions

Close Menu
Instant Support