Tryst 2018 IIT Delhi
Cyber Forensics Workshop
Eager to learn Cyber Forensics just in 1 Day!!!
We have come with Workshop based on Cyber Forensics.
For Assistance Call
Vivek Kumar Singh +91-8744059520Meghanad +91-8744059531 Shivani Singh +91-7065535500
Ratika +91-9990203445
Course Description
OVERVIEW
Forensics will focus on getting you up and running with Arduino quickly, so that you will understand the basic procedures for working with Arduino and can explore further on your own.
An Arduino is a small computer that you can program to control things like lights or motors along with listening to components like motion detection sensors. It can give your project interactivity without needing an expensive and large circuit. Instead, you use a computer to program the Arduino, upload your code to the Arduino, and hook up your circuit.
The duration of this workshop will be 1 day, with Ten hours session , properly divided into theory and hand on practical sessions.Certificate of participation will be provided by RoboTryst 2018 in association with Tryst IIT Delhi.
Workshop Level : Intermediate Level
Best Suited For: All B.Tech/B.E./BCA/BSc Students
Workshop Certification: Robosapiens India Publications.
Workshop Training Kit : Robosapiens Arduino Kit
Kits Source :
Day 1 (Session 1)
1. Understanding of an Organization's IT Environment
- Concept of Zoning – Demilitarized Zone, Militarized Zone
- Basic Servers being used in the IT Environment and their positioning in different Zones
- Brief Insight of the IT Security Devices used
2. What is Computer Forensics all about?
- Difference – Computer Crime & Un-authorized activities
- 6 steps involved in Computer Forensics – Description of what is to be carried in each step
- Need for forensics investigator
3. Security Incident Response
- What is a Security Incident
- Role of the Investigator in investigating a Security Incident
- Evidence Control and Documentation
- Skills and Training of a Forensics Investigator – Technical, Presentation, Professional
4. Corporate Regulation and Privacy Issues
- Computer Abuse in the Corporate World
- Security Policies
- Security and Acceptable-Use Policies
5. Evidence Control and Documentation
- Document, Documents, Document
- Evidence Collection and Inventory
- Chain of Custody
- Evidence Storage and Security
Day 1 (Session 2)
1. Open Source FORENSICS TOOLS
- Windows Forensic Analysis Tools Open Source
- Process Explorer from SysInternals WhatsRunning
- Registry Decoder CPORTS
- Windows File Analyzer
- Windows File Checksum Integrity Verifier
- Registry Ripper
- Microsoft Log Parser Tool
2. Open Source Disk Imaging Tools
- What is Disk Imaging
- Utilities of Disk Imaging Disk Imaging Utilities
- Access Data FTK Imager
- DixmlSetup
3. File Analysis
- What is File Analysis?
- File Attributes
- Unix File Permissions
- Known File Type Signatures & Hashes
- Malware Infected Files
- Virus Characteristics
- Indications of a Trojan Infection
- Worms Windows File Analyzer- File Analysis Software
Day 1 (Session 3)
4. Log analysis
- Why Log Analysis
- Windows Log analysis
- Tools for Log Analysis
- OSSEC HIDS
- Installation Logs
- Windows Event Logs
- UNIX Syslogs
- Firewall and IDS/IPS Logs
- Apache Access Logs & Error Logs
Photo Gallery
Project to be Covered
Software tool kit
Overview
OVERVIEW
Forensics will focus on getting you up and running with Arduino quickly, so that you will understand the basic procedures for working with Arduino and can explore further on your own.
An Arduino is a small computer that you can program to control things like lights or motors along with listening to components like motion detection sensors. It can give your project interactivity without needing an expensive and large circuit. Instead, you use a computer to program the Arduino, upload your code to the Arduino, and hook up your circuit.
The duration of this workshop will be 1 day, with Ten hours session , properly divided into theory and hand on practical sessions.Certificate of participation will be provided by RoboTryst 2018 in association with Tryst IIT Delhi.
Workshop Level : Intermediate Level
Best Suited For: All B.Tech/B.E./BCA/BSc Students
Workshop Certification: Robosapiens India Publications.
Workshop Training Kit : Robosapiens Arduino Kit
Kits Source :
Course
Day 1 (Session 1)
1. Understanding of an Organization's IT Environment
- Concept of Zoning – Demilitarized Zone, Militarized Zone
- Basic Servers being used in the IT Environment and their positioning in different Zones
- Brief Insight of the IT Security Devices used
2. What is Computer Forensics all about?
- Difference – Computer Crime & Un-authorized activities
- 6 steps involved in Computer Forensics – Description of what is to be carried in each step
- Need for forensics investigator
3. Security Incident Response
- What is a Security Incident
- Role of the Investigator in investigating a Security Incident
- Evidence Control and Documentation
- Skills and Training of a Forensics Investigator – Technical, Presentation, Professional
4. Corporate Regulation and Privacy Issues
- Computer Abuse in the Corporate World
- Security Policies
- Security and Acceptable-Use Policies
5. Evidence Control and Documentation
- Document, Documents, Document
- Evidence Collection and Inventory
- Chain of Custody
- Evidence Storage and Security
Day 1 (Session 2)
1. Open Source FORENSICS TOOLS
- Windows Forensic Analysis Tools Open Source
- Process Explorer from SysInternals WhatsRunning
- Registry Decoder CPORTS
- Windows File Analyzer
- Windows File Checksum Integrity Verifier
- Registry Ripper
- Microsoft Log Parser Tool
2. Open Source Disk Imaging Tools
- What is Disk Imaging
- Utilities of Disk Imaging Disk Imaging Utilities
- Access Data FTK Imager
- DixmlSetup
3. File Analysis
- What is File Analysis?
- File Attributes
- Unix File Permissions
- Known File Type Signatures & Hashes
- Malware Infected Files
- Virus Characteristics
- Indications of a Trojan Infection
- Worms Windows File Analyzer- File Analysis Software
Day 1 (Session 3)
4. Log analysis
- Why Log Analysis
- Windows Log analysis
- Tools for Log Analysis
- OSSEC HIDS
- Installation Logs
- Windows Event Logs
- UNIX Syslogs
- Firewall and IDS/IPS Logs
- Apache Access Logs & Error Logs
Project
Project to be Covered Coming Soon
Kit
Software tool kit
Video Gallery