5.00
(3 Ratings)

Digital Cyber Crime Analysts

Categories: Investigation
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

🚀 DCCI Training Highlights – Your Gateway to Cyber Crime Expertise

🔹 Membership on Response Team 👨‍💻
Join an exclusive response team and gain hands-on experience in tackling real cybercrime incidents alongside experts.

🔹 Printed Investigator Identity Card 🕵️
Stand out with a professional investigator ID, enhancing your credibility in the field of digital forensics and cybercrime investigation.

🔹 75+ Advanced Investigation Techniques
Master cutting-edge techniques used in cybercrime investigations, from digital forensics to evidence collection and analysis.

🔹 Work on Real-Life Cases
Engage with actual case studies and real-world scenarios to develop practical skills and industry-ready expertise.

🔹 Access to Private Investigation Tools 🔍
Get hands-on experience with advanced tools used by professionals to solve complex cybercrime cases.

💡 Why DCCI?
This program is tailored for aspiring cybersecurity professionals, equipping you with the knowledge and skills needed to excel in the fast-growing field of cybercrime investigation.

Show More

Course Content

Incident response and evidence collection triage

  • 1. Incident response and evidence collection triage
    01:49:00
  • 2. Prefetch or triage evidence analysis
    01:47:00
  • 3. Dart incident response
    01:42:00
  • 4. Dart evidence collection
    01:20:00
  • 5. Browser Forensic Analysis Decrypting Saved Passwords of Chrome, Firefox & Edge browser without key
    01:24:00
  • 6. Browser Forensic Analysis Decrypting Saved Passwords of Chrome, Firefox & Edge browser without key part-2
    40:00
  • 7. Artifact analysis Browser forensic
    01:02:00
  • 8. Artifact analysis with automation Browser forensic
    30:00
  • 9. Data Recovery practical part 1
    50:00
  • 10. Data Recovery using Linux os
    30:00
  • 11. Acquire disk image & disk cloning for forensic analysis part 1
    35:00
  • 12. Acquire disk image & disk cloning for forensic analysis using Linux part 2
    14:00
  • 13. Autopsy Forensic Analysis & Data Recovery From Disk Image
    01:12:00
  • 14. Topic – Autopsy Forensic Analysis With Disk Image or Vm OS Image’s
    01:02:00
  • 15. Topic – Repair and clean bad sectors in hard drives, pendrive, or any storage devices.
    55:00
  • 16. Topic – windows password cracking or bypass.
    52:00
  • 17. Ram Memory Forensic Analysis Or Dumping Ram Memory A Step-By-Step Guide-2
    01:22:00
  • 18. Android Mobile Forensics A Comprehensive Guide To Data Recovery And Analysis (Practical)
    02:01:00
  • 19. Malware Analysis In Real Fraud Application And Get Hacker Details-4
    01:18:00
  • 20. Secure File Deletion Anti-Forensic Techniques To Permanently Erase Data
    45:00
  • 21. Digital Image Investigation Techniques For Detecting Manipulation And Recovering Metadata
    01:20:00
  • 22. Osint Investigation Methodology And Learning About Sock Puppets.
    01:25:00
  • 23. How To Create A Perfect Sock Puppet Account For Osint Investigation.
    01:20:00
  • 24. Osint Investigation Using Google Dorks
    01:15:00
  • 25. Username Reverse Lookup
    01:45:00
  • 26. Username Reverse Search Practical 2
    01:28:00
  • 27. Email Osint Practical 1
    01:16:00
  • 28. Location Tracking And Activity Monitoring Via Google Gaia Id
    01:27:00
  • 29. Location Tracking And Activity Monitoring Via Google Gaia Id With Automation Part – 2
    01:16:00
  • 30. Dump Any Telegram Bot Data Or Get Info About Any Telegram Bot & Github User Osint And Skype Osint To Find Location Find
    01:28:00
  • 31. Detecting Vpn Or Proxy Ip And How To Detect Vpn Company Using Ip. And Protonmail And Proton Vpn Osint
    36:00
  • 32. Topic – Uncovering Hidden Connections Leveraging Leaked Databases In Osint Investigations
    57:00
  • 33. Topic- Mobile Number Osint Uncovering Hidden Information Part 1
    58:00
  • 34. Topic – OSINT Phone Number Analysis Identifying Online Presence
    01:17:00
  • 35. Topic – Reverse Lookup Discovering Facebook and Instagram Profiles by Phone Number
    01:17:00
  • 36. Track Mobile Number Find Registered Upi, Bank Name, Email & Owner’s Real Name, And Find Facebook Accoubt Using Only Mob Numb
    01:20:00
  • 37. Unmasking Mobile Numbers Osint Investigation With Phoneinfoga & Private Telegram Bots Or Reveal Social Media Facebook Accoun
    01:18:00
  • 38. Telegram Osint Uncovering User Messages & Investigating Telegram Accounts
    01:21:00
  • 39. Bluetooth Surveillance Exploiting Speakers Headphones, Earbuds & Airpods For Listening Conversation Eavesdropping
    01:20:00
  • 40. Topic – Social Media Intelligence (Socmint) In Osint Methods & Case Studies
    01:50:00
  • 41. Topic – Socmint Investigation Analyzing Social Media Posts, Profile Pictures & Timestamps
    01:18:00
  • 42. Topic – Socmint Investigation Uncovering Private Instagram & Facebook Profiles And Find Or Investigate Any User Using Emoji
    60:00
  • 43. Topic – Osint & Socmint Investigation Uncovering Facebook Private Profiles & Social Media Insights
    53:00
  • 44. Topic – Geo-Locating Images Using Geoint & Osint Techniques To Find Exact Locations
    01:08:00
  • 45. Topic – Geoint & Osint Finding Exact Locations Through Satellite Imagery & Open-Source Intelligence
    01:40:00
  • 46. Topic – Osint Investigation Finding Social Media Profiles Through Face Reverse Image Search Part-1
    52:00
  • 47. Topic – Osint Investigation Finding Social Media Profiles Through Face Reverse Image Search Part-2
    01:06:00
  • 48. Topic – Deepfake Detection & Investigation Tracing Back To The Source Using Osint & Detect Deepfake Video, Audios, And Image
    48:00
  • 49. Topic – Dark Web Investigation Osint Techniques For Tracing Real Users And Deanonymizing Sources
    01:00:00
  • 50. Topic – Osint Investigation Finding Wifi And Bluetooth Device Locations
    59:00
  • 51. Topic – Cell Tower Location Intelligence Using OSINT to Identify Towers in a Specific Area
    38:00
  • 52. Topic – OSINT Investigation Using Instagram, Facebook, and X for Social Media Surveillance
    44:00
  • 53. Topic – OSINT Investigation Using X And YouTube for Social Media Surveillance
    01:01:00
  • 54. Topic – Cyber Investigation How to Track IP Addresses and Identify Device Owners
    49:00
  • 55. Topic – Location Intelligence Using GPS for Device Tracking
    43:00
  • 56. Topic – Location Intelligence Click Remotely Photo And Using Gps For Device Location
    26:00
  • 57. Topic – Tracking VOIP Calls Identifying IP Addresses Behind WhatsApp, Telegram, and Signal. Only calling no click and link
    46:00

Student Ratings & Reviews

5.0
Total 3 Ratings
5
3 Ratings
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
very good
Nice
CHIRAG TANDEL
8 months ago
Rohit Sir Is Best Teacher 💞