Digital Cyber Crime Analysts
About Course
🚀 DCCI Training Highlights – Your Gateway to Cyber Crime Expertise
🔹 Membership on Response Team 👨💻
Join an exclusive response team and gain hands-on experience in tackling real cybercrime incidents alongside experts.
🔹 Printed Investigator Identity Card 🕵️
Stand out with a professional investigator ID, enhancing your credibility in the field of digital forensics and cybercrime investigation.
🔹 75+ Advanced Investigation Techniques
Master cutting-edge techniques used in cybercrime investigations, from digital forensics to evidence collection and analysis.
🔹 Work on Real-Life Cases
Engage with actual case studies and real-world scenarios to develop practical skills and industry-ready expertise.
🔹 Access to Private Investigation Tools 🔍
Get hands-on experience with advanced tools used by professionals to solve complex cybercrime cases.
💡 Why DCCI?
This program is tailored for aspiring cybersecurity professionals, equipping you with the knowledge and skills needed to excel in the fast-growing field of cybercrime investigation.
Course Content
Incident response and evidence collection triage
-
1. Incident response and evidence collection triage
01:49:00 -
2. Prefetch or triage evidence analysis
01:47:00 -
3. Dart incident response
01:42:00 -
4. Dart evidence collection
01:20:00 -
5. Browser Forensic Analysis Decrypting Saved Passwords of Chrome, Firefox & Edge browser without key
01:24:00 -
6. Browser Forensic Analysis Decrypting Saved Passwords of Chrome, Firefox & Edge browser without key part-2
40:00 -
7. Artifact analysis Browser forensic
01:02:00 -
8. Artifact analysis with automation Browser forensic
30:00 -
9. Data Recovery practical part 1
50:00 -
10. Data Recovery using Linux os
30:00 -
11. Acquire disk image & disk cloning for forensic analysis part 1
35:00 -
12. Acquire disk image & disk cloning for forensic analysis using Linux part 2
14:00 -
13. Autopsy Forensic Analysis & Data Recovery From Disk Image
01:12:00 -
14. Topic – Autopsy Forensic Analysis With Disk Image or Vm OS Image’s
01:02:00 -
15. Topic – Repair and clean bad sectors in hard drives, pendrive, or any storage devices.
55:00 -
16. Topic – windows password cracking or bypass.
52:00 -
17. Ram Memory Forensic Analysis Or Dumping Ram Memory A Step-By-Step Guide-2
01:22:00 -
18. Android Mobile Forensics A Comprehensive Guide To Data Recovery And Analysis (Practical)
02:01:00 -
19. Malware Analysis In Real Fraud Application And Get Hacker Details-4
01:18:00 -
20. Secure File Deletion Anti-Forensic Techniques To Permanently Erase Data
45:00 -
21. Digital Image Investigation Techniques For Detecting Manipulation And Recovering Metadata
01:20:00 -
22. Osint Investigation Methodology And Learning About Sock Puppets.
01:25:00 -
23. How To Create A Perfect Sock Puppet Account For Osint Investigation.
01:20:00 -
24. Osint Investigation Using Google Dorks
01:15:00 -
25. Username Reverse Lookup
01:45:00 -
26. Username Reverse Search Practical 2
01:28:00 -
27. Email Osint Practical 1
01:16:00 -
28. Location Tracking And Activity Monitoring Via Google Gaia Id
01:27:00 -
29. Location Tracking And Activity Monitoring Via Google Gaia Id With Automation Part – 2
01:16:00 -
30. Dump Any Telegram Bot Data Or Get Info About Any Telegram Bot & Github User Osint And Skype Osint To Find Location Find
01:28:00 -
31. Detecting Vpn Or Proxy Ip And How To Detect Vpn Company Using Ip. And Protonmail And Proton Vpn Osint
36:00 -
32. Topic – Uncovering Hidden Connections Leveraging Leaked Databases In Osint Investigations
57:00 -
33. Topic- Mobile Number Osint Uncovering Hidden Information Part 1
58:00 -
34. Topic – OSINT Phone Number Analysis Identifying Online Presence
01:17:00 -
35. Topic – Reverse Lookup Discovering Facebook and Instagram Profiles by Phone Number
01:17:00 -
36. Track Mobile Number Find Registered Upi, Bank Name, Email & Owner’s Real Name, And Find Facebook Accoubt Using Only Mob Numb
01:20:00 -
37. Unmasking Mobile Numbers Osint Investigation With Phoneinfoga & Private Telegram Bots Or Reveal Social Media Facebook Accoun
01:18:00 -
38. Telegram Osint Uncovering User Messages & Investigating Telegram Accounts
01:21:00 -
39. Bluetooth Surveillance Exploiting Speakers Headphones, Earbuds & Airpods For Listening Conversation Eavesdropping
01:20:00 -
40. Topic – Social Media Intelligence (Socmint) In Osint Methods & Case Studies
01:50:00 -
41. Topic – Socmint Investigation Analyzing Social Media Posts, Profile Pictures & Timestamps
01:18:00 -
42. Topic – Socmint Investigation Uncovering Private Instagram & Facebook Profiles And Find Or Investigate Any User Using Emoji
60:00 -
43. Topic – Osint & Socmint Investigation Uncovering Facebook Private Profiles & Social Media Insights
53:00 -
44. Topic – Geo-Locating Images Using Geoint & Osint Techniques To Find Exact Locations
01:08:00 -
45. Topic – Geoint & Osint Finding Exact Locations Through Satellite Imagery & Open-Source Intelligence
01:40:00 -
46. Topic – Osint Investigation Finding Social Media Profiles Through Face Reverse Image Search Part-1
52:00 -
47. Topic – Osint Investigation Finding Social Media Profiles Through Face Reverse Image Search Part-2
01:06:00 -
48. Topic – Deepfake Detection & Investigation Tracing Back To The Source Using Osint & Detect Deepfake Video, Audios, And Image
48:00 -
49. Topic – Dark Web Investigation Osint Techniques For Tracing Real Users And Deanonymizing Sources
01:00:00 -
50. Topic – Osint Investigation Finding Wifi And Bluetooth Device Locations
59:00 -
51. Topic – Cell Tower Location Intelligence Using OSINT to Identify Towers in a Specific Area
38:00 -
52. Topic – OSINT Investigation Using Instagram, Facebook, and X for Social Media Surveillance
44:00 -
53. Topic – OSINT Investigation Using X And YouTube for Social Media Surveillance
01:01:00 -
54. Topic – Cyber Investigation How to Track IP Addresses and Identify Device Owners
49:00 -
55. Topic – Location Intelligence Using GPS for Device Tracking
43:00 -
56. Topic – Location Intelligence Click Remotely Photo And Using Gps For Device Location
26:00 -
57. Topic – Tracking VOIP Calls Identifying IP Addresses Behind WhatsApp, Telegram, and Signal. Only calling no click and link
46:00
