Tryst-2017 IIT Delhi

Cyber Forensics Workshop

 

Eager to learn Cyber Forensics just in 1 Day!!!

We have come with Workshop based on Cyber Forensics.

For Assistance Call

Ratika +91-9990203445
Anupama +91-8744059531
Ankit Kumar Jain +91-7065174555
Vivek Kumar Singh +91-8744059520
  • Cyber Forensics workshop
  • Cyber Forensics training

Course Description

OVERVIEW

Forensics will focus on getting you up and running with Arduino quickly, so that you will understand the basic procedures for working with Arduino and can explore further on your own. An Arduino is a small computer that you can program to control things like lights or motors along with listening to components like motion detection sensors. It can give your project interactivity without needing an expensive and large circuit. Instead, you use a computer to program the Arduino, upload your code to the Arduino, and hook up your circuit.
The duration of this workshop will be 1 day, with Ten hours session , properly divided into theory and hand on practical sessions.Certificate of participation will be provided by RoboTryst 2017 in association with Tryst IIT Delhi.

Workshop Level : Intermediate Level
Best Suited For: All B.Tech/B.E./BCA/BSc Students
Workshop Certification: Robosapiens Technologies Pvt. Ltd.
Workshop Training Kit : Robosapiens Arduino Kit
Kits Source : logo-robomart

Day 1 (Session 1)

1. Understanding of an Organization's IT Environment
  • Concept of Zoning – Demilitarized Zone, Militarized Zone
  • Basic Servers being used in the IT Environment and their positioning in different Zones
  • Brief Insight of the IT Security Devices used
2. What is Computer Forensics all about?
  • Difference – Computer Crime & Un-authorized activities
  • 6 steps involved in Computer Forensics – Description of what is to be carried in each step
  • Need for forensics investigator
3. Security Incident Response
  • What is a Security Incident
  • Role of the Investigator in investigating a Security Incident
  • Evidence Control and Documentation
  • Skills and Training of a Forensics Investigator – Technical, Presentation, Professional
4. Corporate Regulation and Privacy Issues
  • Computer Abuse in the Corporate World
  • Security Policies
  • Security and Acceptable-Use Policies
5. Evidence Control and Documentation
  • Document, Documents, Document
  • Evidence Collection and Inventory
  • Chain of Custody
  • Evidence Storage and Security

Day 1 (Session 2)

1. Open Source FORENSICS TOOLS
  • Windows Forensic Analysis Tools Open Source
  • Process Explorer from SysInternals WhatsRunning
  • Registry Decoder CPORTS
  • Windows File Analyzer
  • Windows File Checksum Integrity Verifier
  • Registry Ripper
  • Microsoft Log Parser Tool
2. Open Source Disk Imaging Tools
  • What is Disk Imaging
  • Utilities of Disk Imaging Disk Imaging Utilities
  • Access Data FTK Imager
  • DixmlSetup
3. File Analysis
  • What is File Analysis?
  • File Attributes
  • Unix File Permissions
  • Known File Type Signatures & Hashes
  • Malware Infected Files
  • Virus Characteristics
  • Indications of a Trojan Infection
  • Worms Windows File Analyzer- File Analysis Software

Day 1 (Session 3)

4. Log analysis
  • Why Log Analysis
  • Windows Log analysis
  • Tools for Log Analysis
  • OSSEC HIDS
  • Installation Logs
  • Windows Event Logs
  • UNIX Syslogs
  • Firewall and IDS/IPS Logs
  • Apache Access Logs & Error Logs

Photo Gallery

Project to be Covered

Software tool kit

Overview

OVERVIEW

Forensics will focus on getting you up and running with Arduino quickly, so that you will understand the basic procedures for working with Arduino and can explore further on your own. An Arduino is a small computer that you can program to control things like lights or motors along with listening to components like motion detection sensors. It can give your project interactivity without needing an expensive and large circuit. Instead, you use a computer to program the Arduino, upload your code to the Arduino, and hook up your circuit.
The duration of this workshop will be 1 day, with Ten hours session , properly divided into theory and hand on practical sessions.Certificate of participation will be provided by RoboTryst 2017 in association with Tryst IIT Delhi.

Workshop Level : Intermediate Level
Best Suited For: All B.Tech/B.E./BCA/BSc Students
Workshop Certification: Robosapiens Technologies Pvt. Ltd.
Workshop Training Kit : Robosapiens Arduino Kit
Kits Source : logo-robomart

Course

Day 1 (Session 1)

1. Understanding of an Organization's IT Environment
  • Concept of Zoning – Demilitarized Zone, Militarized Zone
  • Basic Servers being used in the IT Environment and their positioning in different Zones
  • Brief Insight of the IT Security Devices used
2. What is Computer Forensics all about?
  • Difference – Computer Crime & Un-authorized activities
  • 6 steps involved in Computer Forensics – Description of what is to be carried in each step
  • Need for forensics investigator
3. Security Incident Response
  • What is a Security Incident
  • Role of the Investigator in investigating a Security Incident
  • Evidence Control and Documentation
  • Skills and Training of a Forensics Investigator – Technical, Presentation, Professional
4. Corporate Regulation and Privacy Issues
  • Computer Abuse in the Corporate World
  • Security Policies
  • Security and Acceptable-Use Policies
5. Evidence Control and Documentation
  • Document, Documents, Document
  • Evidence Collection and Inventory
  • Chain of Custody
  • Evidence Storage and Security

Day 1 (Session 2)

1. Open Source FORENSICS TOOLS
  • Windows Forensic Analysis Tools Open Source
  • Process Explorer from SysInternals WhatsRunning
  • Registry Decoder CPORTS
  • Windows File Analyzer
  • Windows File Checksum Integrity Verifier
  • Registry Ripper
  • Microsoft Log Parser Tool
2. Open Source Disk Imaging Tools
  • What is Disk Imaging
  • Utilities of Disk Imaging Disk Imaging Utilities
  • Access Data FTK Imager
  • DixmlSetup
3. File Analysis
  • What is File Analysis?
  • File Attributes
  • Unix File Permissions
  • Known File Type Signatures & Hashes
  • Malware Infected Files
  • Virus Characteristics
  • Indications of a Trojan Infection
  • Worms Windows File Analyzer- File Analysis Software

Day 1 (Session 3)

4. Log analysis
  • Why Log Analysis
  • Windows Log analysis
  • Tools for Log Analysis
  • OSSEC HIDS
  • Installation Logs
  • Windows Event Logs
  • UNIX Syslogs
  • Firewall and IDS/IPS Logs
  • Apache Access Logs & Error Logs

Project

Project to be Covered Coming Soon

Kit

Software tool kit

Video Gallery

Video Gallery

Coming soon...