Short Courses


Course Title:

Steganography and Image File Forensics (SIFF)

Course Duration:

12 Weeks - 2 Hours a Day, 5 Days a Week

Course Objectives:

This course is designed to cover different aspects of image files forensics and steganography. In this course graduates will learn different techniques of steganography and how to conduct forensics investigation in image files that will lead to the discovering of potential evidences. The course will also cover Web attacks investigation techniques; graduates will also learn how to track emails and investigating email crimes.

Course Contents:

  1. Steganography and Image Files Forensics
    • Steganography
    • Steganography Techniques
    • Steganalysis
    • Image Files
    • Data Compression
    • Locating and Recovering Image Files
    • Image Files Forensics Tools

  2. Investigating Web Attacks
    • Introduction to Web Applications and Web Servers
    • Web Logs
    • Web Attacks
    • Web Attacks Investigation
    • Web Attacks Deletion Tools
    • Tools for Locating IP Address

  3. Tracking Emails and Investigating Email Crimes
    • Emails System Basics
    • Email Crimes
    • Email Headers
    • Steps to Investigate
    • Emails Forensics Tools
    • Laws and Acts against Emails Crimes

  4. Application Password Crackers
    • Password Cracking Concepts
    • Types of Password Attacks
    • System Software Password Cracking
    • Application Software Password Cracking
    • Password Cracking Tools

  5. Forensics Investigation Using AccessData FTK
    • Overview and Installation of FTK
    • FTK Case Manager User Interface
    • FTK Examiner User Interface
    • Starting with FTK
    • FTK Interface Tabs
    • Adding and Processing Static, Live and Remote Evidence
    • Using and Managing Filters
    • Using Index Search and Live Search
    • Decrypting EFS and Other Encryption Files
    • Working with Reports

  6. Investigative Reports
    • Computer Forensics Reports
    • Computer Forensics Reports Template
    • Investigative Report Writing
    • Sample Forensics Report
    • Report Writing Tools

  7. Becoming an Expert Witness
    • Expert Witness
    • Types of Expert Witness
    • Scope of Expert Witness Testimony
    • Evidence Processing
    • Rules for Expert Witness
    • General Ethics While Testifying

Student Learning Outcome

Upon successful completion of the courses graduates will be able to understand the process of investigating cyber crime, laws involved, and the details in obtaining a search warrant, different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category, roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene, steganography and image files forensics, steganalysis, image files, data compression, locating and recovering image files, investigating web attacks, tracking emails and investigating email crimes.

Target Group:

Forensics Analysts, Penetration Testers, Auditors, Law Enforcement Personnel, Defense and Military personals, Legal Professionals, Bankers, Security Professionals, Managers, Operational Personnel who have security as their primary job function, IT Engineers and Supervisors, Administrators, and anyone who is concerned about the integrity of the network infrastructures.

Admission Requirements:

Attending this course individual must have strong foundation in Information and Network Security. For those that are brand new to the field with no background knowledge, Certificate in Information and Network Security (CINS) would be the recommended starting point.

Course Fee

Tsh. 620,000/=

Group Arrangement:

TZS 85,000 per hour for group of 10-20 people
Duration: 15 days; 8 hours a day

Download Application Form for this Course