EICTA, IIT Kanpur

Digital Forensics and Incident Investigation

Learn practical digital forensics, cybercrime investigation, incident response and evidence analysis across systems, networks and cloud

  • Hands on digital forensics training with live weekend sessions led by industry practitioners.
  • Learn end to end cybercrime investigation, evidence handling and incident investigation techniques.
  • Work with real forensic concepts across operating systems, networks, databases, cloud and malware analysis.
Enroll Now

Talk to our Counsellor

Intermediate Level

Certification

Online Live

Mode of Delivery

36 Hours

Course Duration

9th February, 2026

Start Date

What you'll learn

  • Understand digital forensics principles, cybercrime investigation processes, and legal aspects of evidence handling.
  • Perform data acquisition, disk analysis, and operating system forensics across Windows, Linux, and Mac.
  • Investigate network attacks, malware incidents, email crimes, web attacks, and cloud-based incidents.
  • Create professional forensic reports and present investigation findings with confidence.

Skills you'll gain

Data Acquisition and Disk ForensicsAnti Forensics Detection and AnalysisOperating System Forensics for Windows, Mac and LinuxNetwork, Database and Cloud ForensicsMalware Analysis using Static and Dynamic TechniquesDark Web ForensicsForensics Report Writing and Documentation

Tools

kali linux

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Certificate

Course Fee

16900.00 +GST
Enroll Now

Designed for Cybercrime and Investigation Roles

Ideal for learners who want to understand how cybercrimes are investigated, analysed and presented in real world cases.

Practical and Investigation Focused Learning

Covers real investigation workflows including evidence acquisition, analysis, reconstruction and reporting.

Exposure to Multiple Forensics Domains

Gain hands on knowledge across disk, OS, network, database, cloud, malware, mobile and dark web forensics.

Certification Oriented Learning Path

Aligned with knowledge areas relevant for CHFI, GCFA and GCFE certification aspirants.

FAQs

Subscribe for expert insights and updates on the latest in emerging tech, directly from the thought leaders at EICTA consortium.