ESAMI Offices

Short Courses

Information Communication Technology

The ICT programme has been widely acclaimed as one of the most competitive programmes in the region.
The programme covers specializations in the areas of Hardware, Software and Design in addition to equipping
the student with a wide range of skills and knowledge necessary for any Information Technology professional.

Sorry,the application deadline for this course has expired.

Course Title: Cybercrime & Forensic Investigation - Sept 2018

Venue: ESAMI Headquarters, Arusha, TANZANIA  
Learning Duration:  2 Weeks 
Starting: 10 Sep 2018  Ending: 21 Sep 2018
Fees: 1500 USD
Payment Details: To cover tuition and training materials only.


Computer forensic investigation detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable participants to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.



  • Police and other law enforcement personnel

  • Defense and Military personnel

  • e-Business Security professionals

  • Systems administrators

  • Legal professionals

  • Banking, Insurance and other professionals

  • Government agencies

  • IT managers

  • Auditors



At the end of the course participant will be able to:

  • Identify an intruder’s footprints and properly gather the necessary evidence to prosecute.

  • Explain forensic trade, including software, hardware and specialized techniques

  • Describe the process of investigating cyber-crime, laws involved, and the details in obtaining a search warrant.

  • Explain different types of digital evidence, rules of evidence, digital evidence examination process and electronic crime and digital evidence consideration by crime category

  • Explain roles of first responder, first responder toolkit, securing and evaluation electronic crime scene, conducting preliminary interviews, document electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene.

  • Recover deleted files and deleted partitions in Windows, Mac OS X, and Linux

  • Describe the process involved in forensic investigation using Access Data FTK and encase Steganography and its techniques, steganalysis and image file forensics

  • Explain password cracking concepts, tools, types of password attacks and how to investigate password protected file breach

  • Differentiate types of log capturing techniques, log management, time synchronization, log capturing tools

  • Investigate logs, network traffic, wireless attacks, and web attacks



Investigating cyber-crime, Password cracking concepts, Digital evidence, Image file forensics, investigation of email crimes, log management, forensic investigation, steganalysis, securing and evaluating electronic crime scene, recovering deleted files, Computer forensics investigation process, Understanding hard disks and file systems, Operating system forensics, Defeating anti-forensics techniques, Data acquisition and duplication, Network forensics, Investigating web attacks, Database forensics, Malware forensics, Investigating, Mobile forensics, Investigative reports.

Course No:  2018-09-10-3-10-1944



29 Jan 2019
    BUSINESS SCHOOL ACTIVITY CALENDAR FOR 2019 ESAMI Business School is inviting applications for its degree programmes scheduled to commence as below.   S/N VENUE ...
View More

Short Courses Calendar





facebook   twitter