SlideShare a Scribd company logo
1 of 9
Download to read offline
Cyber Crime Investigator
Internet Fundamentals:
 The history of the Internet
 How the Internet is managed
 IP Addresses (IPv4 and IPv6)
 Domain Name System (DNS)
 Secure DNS Deployment
Web 101:
 Registering & configuring a domain
 Setting up a domain with a web host
 Setting up custom MX records
 Setting up the email system
 Setting up MySQL databases
 Setting up one-click installs
 Setting up a Virtual Private Server
 Setting up a cloud server
 Configuring SSL
 Setting up Word press
Hidden Web:
 What do criminals sell online?
 Case 1: Silk Road
 Case 2: Dark market
 Anatomy of a Financial Cyber Crime
Organization
 Tor – the technology powering the
Hidden web
 Bit coin – the powerful virtual currency
Coding for the web:
 HTML5 basics
 PHP basics
 MySQL basics
 Customizing an HTML5 web template
Cyber Crime 101
Terminologies & Real World Cyber Crime cases
EBanking Attacks:
 Phishing Attacks (clone, spear, phone,
Email spoofing, fake urls etc.)
 Phishing Countermeasures
 Sender Policy Framework
 Domain Keys Identified Mail
 Plastic Card Fraud
 ATM Card Skimming & PIN Capturing
 Preventing Card Trapping.
 The US$ 45 million ATM fraud
Web Hacking:
 SQL Injection
 Broken Athentication and Session
Hijacking
 Cross Site Scripting
 Insecure Direct Object Access
 Security Misconfiguration
 Sensetive Data Exposure
 Missing Function Level Access Contrrol
 Cross Site Request Forgery
 Using Component with known
Vulnerabilities
 Unvalidated Redirect and Forwards
Web Investigation:
 External Examination
 Confiscation and seizure
 Handling Real World Investigations
 Electronic Crime Scene Investigation
 Investigating Internet based crimes
 Computer Emergency Response Teams
 Setting up a Cyber Crime Investigation
Cell
 ASCL Case File: E-commerce Fraud
Email Investigation:
 Email basics
 Analysis of the Gmail, Rediffmail,
Yahoo and Thunderbird headers
 Online email header analysis tools
 Tracking email accounts
 Common Internet Message Headers
Investigating Server Logs:
 Configuring an FTP Server
 FTP Server Logs
 Configuring a Web Server
 Web Server Logs
 Configuring a DNS server
 ASCL Case File: Web Defacement
 ASCL Case File: Cyber Sabotage
Investigating Web Browsers:
 Investigating Mozilla Firefox
 Investigating Safari
 Investigating Google Chrome
 Investigating Opera
 Investigating Internet Explorer
Cyber Security Fundamentals:
 Secure eBanking
 Securing your Laptop
 Password security
 Securing your Smartphone
 Social network security
 Securing your home WiFi
 Securing your Gmail account
 Securing Firefox
 Securing Chrom
PRATICAL ASSESSMENT / PROJECT: COUNTER-STRIKE CASE STUDY &
FINANCIAL FRAUD CASE STUDY
Cyber Forensic Analyst
Forensic Fundamentals:
 Forensic Audio and Video Analysis
 Bloodstain Pattern Analysis
 Digital Evidence
 DNA Evidence
 Forensic Drug Chemistry
 Explosives Analysis
 Fingerprint Analysis
 Firearms Examination
 Footwear & Tire Track Examination
 Forensic Toxicology
 Trace Evidence.
 Crime Scene Photography
Cyber Forensics Fundamentals:
 Understanding Cyber Forensics
 Electronic Crime Scene Investigation
 Best Practices for Seizing Electronic Evidence and Computer-Based Electronic
Evidence
 Forensic Examination of Digital Evidence
 Integrating Forensic Techniques into Incident Response
 Digital Forensic Analysis Methodology
Cyber Forensics - Best Practices, SOPs & Guidelines:
 B/P for Computer Forensics, Mobile Phone Forensics & Portable GPS Device
Examinations
 SOP for Computer Forensics
 Capture of Live Systems
 Procedures for imaging and analyzing Mac OS X computers
 Locating potential evidence in P2P
 Guidelines for Validation Testing & for Training
 Quality Assurance for Digital Evidence Laboratories & for Processing of Digital
and
 Multimedia Evidence
 Core Competencies for Forensic Audio & Mobile Phone Forensics
Cyber Forensic Case Files:
 ASCL Case File: Financial Fraudster
 ASCL Case File: Hacking & Intrusion
 ASCL Case File: DDOS attack
 ASCL Case File: Death Investigation
 ASCL Case File: Malware
 ASCL Case File: Money Laundering
 ASCL Case File: Piracy
 ASCL Case File: Tax Evasion
 ASCL Case File: Terrorism
File Forensics: file extensions, file signatures and file formats
Image Forensics:
 ASCL Image Analysis Tool" for detecting and analyzing detailed Meta
information in image files.
 Exchangeable image file (Exif) format
 Using the ASCL Exif Tool
 Format-Based Forensics
 Camera-Based Forensics
 Pixel-Based Forensics
 Statistical-Based Forensics
 Geometric-Based Forensics
 Physics-Based Forensics
 Video Forensics
 Printer Forensics
Financial Crimes:
 Basic financial concepts: Shares,Debentures and Bonds, Money Market
Instruments, Commodities,Derivatives, Futures, Options, Swaps, Hedging &
Arbitrage, Carbon Credits & Depository Receipts
 ASCL Case Files: Income Tax Raid
 ASCL Case Files: Lottery Fraud
 ASCL Case Files: Accounting Fraud
 Investigation Guidelines
Crypto Forensics:
 How cryptography works: Keys, Symmetric cryptography, Asymmetric
cryptography
 Hash functions
 Digital Signatures
 Digital signature certificates
 Obtaining a digital signature certificate
 Digitally signing emails
 Digitally signing word documents
 ASCL Case Files: Digital Signature Fraud
Password Forensics:
 File passwords recovery techniques (Instant Password Extraction, "Fake"
Password
 Creation, Reset the Password, Brute Force Attack, Dictionary Attack, Known
Plain Text Attack, Guaranteed Recovery)
 Using 16 file passwords recovery software
 Breaking Windows OS passwords
 Cracking PGP passphrases
 Cracking MD5 hashes
 Steganography
Windows Forensics:
 Conduct live forensics on a Windows computer:
RAM forensics, volatile memory forensics, deleted data recovery.
 Forensic implications of: Microsoft Vista, Microsoft Windows 7
Documentation & Reports:
 Request for Service
 Chain of Custody Form
 Computer Evidence Assessment / Analysis Checklist
 Cyber Forensics Analysis Report
 Sample FIR, Criminal Complaint, Property Search & Seizure Form, Final Form
and Property Final Form
 Complaint to Adjudicating Officer
 Integrated Investigation Forms
 Sample Subpoenas and Reports, Case Examples & Sample Forms (NIJ)
Media Sanitization:
 Sanitization techniques
 Tools and resources
 Sanitization validation form
 Standard operating procedures for digital media sanitization
 Clearing and sanitization matrix
 Standards for sanitization / secure disposal
 Sample media sanitization and destruction policy
RESEARCH PROJECT TOPIC: “FORENSIC INVESTIGATION OF SOCIAL MEDIA AS A
PAYMENT SYSTEM.”
International Program in Cyber Law:
1. Cyber Law (India)
2. Data Privacy Law
3. IT Law Compliance
4. International Law on cyber crime
5. US Law on cyber crime
6. EU Law on cyber crime
7. International E-commerce Law
8. Global Cyber Law Database
RESEARCH PROJECT: “A BRIEF HANDBOOK ON CYBER CRIME CASES UNDER
INFORMATION TECHNOLOGY ACT, 2000 – DETAILS AND ANALYSIS.”
Fraud Control:
1. Fraud Risk Investigation
2. Fraud And Corruption Control
3. IS 15900
4. UK Bribery Act 2010
5. US Foreign Corrupt Practices Act
ASSESSMENT:
1. TRANSPARENCY INTERNATIONAL GUIDELINES ON GOOD PRACTICES &
PROCEDURE FOR ANTI-BRIBERY PROGRAM
2. 1S 15900:
 Conduct IS 15900 Gap Analysis for any organization
 Fill Risk Assessment Form
 Fill Fraud Risk Treatment Form
 Prepare: Fraud & Corruption Control Manual for your organization
Cyber Security:
Cyber Security Fundamentals:
 Lexcode Information Security Sphere
 Computer Security Incident Handling Guide
 National Infrastructure Protection - Emerging Technologies
 Social Networking - Good Practice Guide
 Mobile Devices - Executive Briefing Paper
 Guidelines for Media Sanitization
 Contingency Planning Guide for Federal Information Systems
Cyber Security Standards:
 RBI Guidelines on Information security, Electronic Banking, Technology
risk management and cyber frauds
 Security and Privacy Controls for Federal Information Systems and
Organizations
 Understanding the Payment Card Industry Data Security Standard version
3.0 (PCI DSS Guide)
 Requirements and Security Assessment Procedures (Version 3.0) - Payment
Card Industry (PCI) Data Security Standard
 Vetting the Security of Mobile
Additional Case Papers Prepared for Following Topics:
1. Evernote Application and Data Privacy – Few Flaws and Possible Fixes –A
Case Study
2. Google Glass – How it is Hacking your Privacy & Bypassing Surveillance – A
Case Study
3. How Whatsapp is Bugging Us – A Case Study
COIN [Collaborative Online Investigation Network]:
Contributions:
1. 500+ Suspicious IP Address
2. 800+ Fake Domain / Websites
3. Tor Check List
ASCL_Syllabus_Project Report Details

More Related Content

What's hot

Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityWavecrest Computing
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attackMark Mair
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics WorkshopTim Fletcher
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Cyber law
Cyber lawCyber law
Cyber lawabiabel
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)Neeraj Mahajan
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Survey & Review of Digital Forensic
Survey & Review of Digital ForensicSurvey & Review of Digital Forensic
Survey & Review of Digital ForensicAung Thu Rha Hein
 

What's hot (20)

Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
APT 510 Assignment 1
APT 510 Assignment 1APT 510 Assignment 1
APT 510 Assignment 1
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Insecure mag-33
Insecure mag-33Insecure mag-33
Insecure mag-33
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attack
 
Digital Forensics Workshop
Digital Forensics WorkshopDigital Forensics Workshop
Digital Forensics Workshop
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Cyber law
Cyber lawCyber law
Cyber law
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Digital footprints (preview)
Digital footprints (preview)Digital footprints (preview)
Digital footprints (preview)
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Survey & Review of Digital Forensic
Survey & Review of Digital ForensicSurvey & Review of Digital Forensic
Survey & Review of Digital Forensic
 

Similar to ASCL_Syllabus_Project Report Details

Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsMustapha Mugisa
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Digital Forensics Projects Research Topics
Digital Forensics Projects Research TopicsDigital Forensics Projects Research Topics
Digital Forensics Projects Research TopicsMatlab Simulation
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyFiroze Hussain
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attemptj9lai
 

Similar to ASCL_Syllabus_Project Report Details (20)

Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Digital Forensics Projects Assistance
Digital Forensics Projects Assistance Digital Forensics Projects Assistance
Digital Forensics Projects Assistance
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Digital Forensics Projects Research Topics
Digital Forensics Projects Research TopicsDigital Forensics Projects Research Topics
Digital Forensics Projects Research Topics
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
 

More from Prakash Prasad ✔ (20)

Term End Results-MPA-II - June 2016
Term End Results-MPA-II - June 2016Term End Results-MPA-II - June 2016
Term End Results-MPA-II - June 2016
 
myrole at ibnk
myrole at ibnkmyrole at ibnk
myrole at ibnk
 
MITx_Cyber security_Syllabus
MITx_Cyber security_SyllabusMITx_Cyber security_Syllabus
MITx_Cyber security_Syllabus
 
Coursera understandingterror 2016
Coursera understandingterror 2016Coursera understandingterror 2016
Coursera understandingterror 2016
 
IIMBx FC201
IIMBx FC201IIMBx FC201
IIMBx FC201
 
MITx 6.00
MITx 6.00MITx 6.00
MITx 6.00
 
IIMBx OM101
IIMBx OM101IIMBx OM101
IIMBx OM101
 
IIMBx AC101
IIMBx AC101IIMBx AC101
IIMBx AC101
 
Coursera CNNQD3CGPQM-DMX
Coursera CNNQD3CGPQM-DMXCoursera CNNQD3CGPQM-DMX
Coursera CNNQD3CGPQM-DMX
 
Coursera KT3KEDR8LS3D_DM
Coursera KT3KEDR8LS3D_DMCoursera KT3KEDR8LS3D_DM
Coursera KT3KEDR8LS3D_DM
 
Certificate-IITBx_I
Certificate-IITBx_ICertificate-IITBx_I
Certificate-IITBx_I
 
Coursera coaching 2015
Coursera coaching 2015Coursera coaching 2015
Coursera coaching 2015
 
Coursera XL8R7FKRPN8B
Coursera XL8R7FKRPN8BCoursera XL8R7FKRPN8B
Coursera XL8R7FKRPN8B
 
IIMBx QM101-Stat-II
IIMBx QM101-Stat-IIIIMBx QM101-Stat-II
IIMBx QM101-Stat-II
 
IIMBx ES101x Certificate _Managerial Effectiveness edX
IIMBx ES101x Certificate _Managerial Effectiveness edXIIMBx ES101x Certificate _Managerial Effectiveness edX
IIMBx ES101x Certificate _Managerial Effectiveness edX
 
Coursera cryptography 2015
Coursera cryptography 2015Coursera cryptography 2015
Coursera cryptography 2015
 
Coursera F5UV9L2NDBWY
Coursera F5UV9L2NDBWYCoursera F5UV9L2NDBWY
Coursera F5UV9L2NDBWY
 
Coursera 4GQ3DJZK3W9E
Coursera 4GQ3DJZK3W9ECoursera 4GQ3DJZK3W9E
Coursera 4GQ3DJZK3W9E
 
Coursera whartonmarketing 2015
Coursera whartonmarketing 2015Coursera whartonmarketing 2015
Coursera whartonmarketing 2015
 
MITx 6.00
MITx 6.00MITx 6.00
MITx 6.00
 

ASCL_Syllabus_Project Report Details

  • 1. Cyber Crime Investigator Internet Fundamentals:  The history of the Internet  How the Internet is managed  IP Addresses (IPv4 and IPv6)  Domain Name System (DNS)  Secure DNS Deployment Web 101:  Registering & configuring a domain  Setting up a domain with a web host  Setting up custom MX records  Setting up the email system  Setting up MySQL databases  Setting up one-click installs  Setting up a Virtual Private Server  Setting up a cloud server  Configuring SSL  Setting up Word press Hidden Web:  What do criminals sell online?  Case 1: Silk Road  Case 2: Dark market  Anatomy of a Financial Cyber Crime Organization  Tor – the technology powering the Hidden web  Bit coin – the powerful virtual currency Coding for the web:  HTML5 basics  PHP basics  MySQL basics  Customizing an HTML5 web template Cyber Crime 101 Terminologies & Real World Cyber Crime cases
  • 2. EBanking Attacks:  Phishing Attacks (clone, spear, phone, Email spoofing, fake urls etc.)  Phishing Countermeasures  Sender Policy Framework  Domain Keys Identified Mail  Plastic Card Fraud  ATM Card Skimming & PIN Capturing  Preventing Card Trapping.  The US$ 45 million ATM fraud Web Hacking:  SQL Injection  Broken Athentication and Session Hijacking  Cross Site Scripting  Insecure Direct Object Access  Security Misconfiguration  Sensetive Data Exposure  Missing Function Level Access Contrrol  Cross Site Request Forgery  Using Component with known Vulnerabilities  Unvalidated Redirect and Forwards Web Investigation:  External Examination  Confiscation and seizure  Handling Real World Investigations  Electronic Crime Scene Investigation  Investigating Internet based crimes  Computer Emergency Response Teams  Setting up a Cyber Crime Investigation Cell  ASCL Case File: E-commerce Fraud Email Investigation:  Email basics  Analysis of the Gmail, Rediffmail, Yahoo and Thunderbird headers  Online email header analysis tools  Tracking email accounts  Common Internet Message Headers
  • 3. Investigating Server Logs:  Configuring an FTP Server  FTP Server Logs  Configuring a Web Server  Web Server Logs  Configuring a DNS server  ASCL Case File: Web Defacement  ASCL Case File: Cyber Sabotage Investigating Web Browsers:  Investigating Mozilla Firefox  Investigating Safari  Investigating Google Chrome  Investigating Opera  Investigating Internet Explorer Cyber Security Fundamentals:  Secure eBanking  Securing your Laptop  Password security  Securing your Smartphone  Social network security  Securing your home WiFi  Securing your Gmail account  Securing Firefox  Securing Chrom PRATICAL ASSESSMENT / PROJECT: COUNTER-STRIKE CASE STUDY & FINANCIAL FRAUD CASE STUDY
  • 4. Cyber Forensic Analyst Forensic Fundamentals:  Forensic Audio and Video Analysis  Bloodstain Pattern Analysis  Digital Evidence  DNA Evidence  Forensic Drug Chemistry  Explosives Analysis  Fingerprint Analysis  Firearms Examination  Footwear & Tire Track Examination  Forensic Toxicology  Trace Evidence.  Crime Scene Photography Cyber Forensics Fundamentals:  Understanding Cyber Forensics  Electronic Crime Scene Investigation  Best Practices for Seizing Electronic Evidence and Computer-Based Electronic Evidence  Forensic Examination of Digital Evidence  Integrating Forensic Techniques into Incident Response  Digital Forensic Analysis Methodology Cyber Forensics - Best Practices, SOPs & Guidelines:  B/P for Computer Forensics, Mobile Phone Forensics & Portable GPS Device Examinations  SOP for Computer Forensics  Capture of Live Systems  Procedures for imaging and analyzing Mac OS X computers  Locating potential evidence in P2P  Guidelines for Validation Testing & for Training  Quality Assurance for Digital Evidence Laboratories & for Processing of Digital and  Multimedia Evidence  Core Competencies for Forensic Audio & Mobile Phone Forensics
  • 5. Cyber Forensic Case Files:  ASCL Case File: Financial Fraudster  ASCL Case File: Hacking & Intrusion  ASCL Case File: DDOS attack  ASCL Case File: Death Investigation  ASCL Case File: Malware  ASCL Case File: Money Laundering  ASCL Case File: Piracy  ASCL Case File: Tax Evasion  ASCL Case File: Terrorism File Forensics: file extensions, file signatures and file formats Image Forensics:  ASCL Image Analysis Tool" for detecting and analyzing detailed Meta information in image files.  Exchangeable image file (Exif) format  Using the ASCL Exif Tool  Format-Based Forensics  Camera-Based Forensics  Pixel-Based Forensics  Statistical-Based Forensics  Geometric-Based Forensics  Physics-Based Forensics  Video Forensics  Printer Forensics Financial Crimes:  Basic financial concepts: Shares,Debentures and Bonds, Money Market Instruments, Commodities,Derivatives, Futures, Options, Swaps, Hedging & Arbitrage, Carbon Credits & Depository Receipts  ASCL Case Files: Income Tax Raid  ASCL Case Files: Lottery Fraud  ASCL Case Files: Accounting Fraud  Investigation Guidelines Crypto Forensics:  How cryptography works: Keys, Symmetric cryptography, Asymmetric cryptography  Hash functions  Digital Signatures  Digital signature certificates
  • 6.  Obtaining a digital signature certificate  Digitally signing emails  Digitally signing word documents  ASCL Case Files: Digital Signature Fraud Password Forensics:  File passwords recovery techniques (Instant Password Extraction, "Fake" Password  Creation, Reset the Password, Brute Force Attack, Dictionary Attack, Known Plain Text Attack, Guaranteed Recovery)  Using 16 file passwords recovery software  Breaking Windows OS passwords  Cracking PGP passphrases  Cracking MD5 hashes  Steganography Windows Forensics:  Conduct live forensics on a Windows computer: RAM forensics, volatile memory forensics, deleted data recovery.  Forensic implications of: Microsoft Vista, Microsoft Windows 7 Documentation & Reports:  Request for Service  Chain of Custody Form  Computer Evidence Assessment / Analysis Checklist  Cyber Forensics Analysis Report  Sample FIR, Criminal Complaint, Property Search & Seizure Form, Final Form and Property Final Form  Complaint to Adjudicating Officer  Integrated Investigation Forms  Sample Subpoenas and Reports, Case Examples & Sample Forms (NIJ) Media Sanitization:  Sanitization techniques  Tools and resources  Sanitization validation form  Standard operating procedures for digital media sanitization  Clearing and sanitization matrix  Standards for sanitization / secure disposal  Sample media sanitization and destruction policy RESEARCH PROJECT TOPIC: “FORENSIC INVESTIGATION OF SOCIAL MEDIA AS A PAYMENT SYSTEM.”
  • 7. International Program in Cyber Law: 1. Cyber Law (India) 2. Data Privacy Law 3. IT Law Compliance 4. International Law on cyber crime 5. US Law on cyber crime 6. EU Law on cyber crime 7. International E-commerce Law 8. Global Cyber Law Database RESEARCH PROJECT: “A BRIEF HANDBOOK ON CYBER CRIME CASES UNDER INFORMATION TECHNOLOGY ACT, 2000 – DETAILS AND ANALYSIS.” Fraud Control: 1. Fraud Risk Investigation 2. Fraud And Corruption Control 3. IS 15900 4. UK Bribery Act 2010 5. US Foreign Corrupt Practices Act ASSESSMENT: 1. TRANSPARENCY INTERNATIONAL GUIDELINES ON GOOD PRACTICES & PROCEDURE FOR ANTI-BRIBERY PROGRAM 2. 1S 15900:  Conduct IS 15900 Gap Analysis for any organization  Fill Risk Assessment Form  Fill Fraud Risk Treatment Form  Prepare: Fraud & Corruption Control Manual for your organization
  • 8. Cyber Security: Cyber Security Fundamentals:  Lexcode Information Security Sphere  Computer Security Incident Handling Guide  National Infrastructure Protection - Emerging Technologies  Social Networking - Good Practice Guide  Mobile Devices - Executive Briefing Paper  Guidelines for Media Sanitization  Contingency Planning Guide for Federal Information Systems Cyber Security Standards:  RBI Guidelines on Information security, Electronic Banking, Technology risk management and cyber frauds  Security and Privacy Controls for Federal Information Systems and Organizations  Understanding the Payment Card Industry Data Security Standard version 3.0 (PCI DSS Guide)  Requirements and Security Assessment Procedures (Version 3.0) - Payment Card Industry (PCI) Data Security Standard  Vetting the Security of Mobile Additional Case Papers Prepared for Following Topics: 1. Evernote Application and Data Privacy – Few Flaws and Possible Fixes –A Case Study 2. Google Glass – How it is Hacking your Privacy & Bypassing Surveillance – A Case Study 3. How Whatsapp is Bugging Us – A Case Study COIN [Collaborative Online Investigation Network]: Contributions: 1. 500+ Suspicious IP Address 2. 800+ Fake Domain / Websites 3. Tor Check List