CybeR-Edic
INVESTIGATION BUREAU
Live Training ONLY FOR CYBER-EXPERTS

Cyber Crime Investigation
TOPICS
CYBER LAW
SOCIAL-MEDIA INSTIGATION
MALWARE INVESTIGATION
LAW INFORCEMENT INVESTGATION TECHNIQ
USER INVESTIGATION
IPDR IP SDR INVESTIGATION
CDR ANLYSYS
TRACKING HIJACKING
DOCUMENTS ANLYSYS
FRAUD SCAM INVESTIGATION ANLYSYS

Ethical HACKING TRAINING
TOPICS
1. INTRODUCTION TO ETHICAL HACKING
2. VIRTUAL HACKING LAB
3. LEARNING KALI LINUX (BASIC TO ADVANCED)
4. FOOTPRINTING ADVANCED LEVEL
5. ENUMARATION / ADVANCED LEVEL [ LINUX / WINDOWS ]
6. BECOME ANONYMOUS ON INTERNET ADVANCED [WINDOWS / LINUX ]
7. SCANNING TECHNIQUES ADVANCED
8. SCANNING COMMANDS NEW ADVANCE SCANNING
9 MALWARE ANLYSIS
10 MAKING RANSOMEWARE MALWARE/TROJAN PRACKTIKAL [NEW]
11 SYSTEM HACK SENDING TXT,PHOTO,VIDEO.PDF ADVANCED BLACK HAT TECHNIQUE
12 PASSWORD CRACKING NEW TOOLS
13 SOCIAL ENGINEERING – BLACK HAT TECHNIQUE PRO LEVEL
14 DOS/DOS ATTACKS LIVE NEW
15 SNIFFING ADVANCED LEVEL
16 METASPLOIT ADVANCED [ MAKING TROJANS /MALWARE/PROTECT]
17 WIRELESS HACKING WITH HARDWARE DEVICES ADVANCES
18 ANDROID HACKING [USING HARDWARE DEVICE/USING WEBSITE/ETC…]
19 ANDROID PENTRESTING [ PRO]
20 WEB TESTING [ NEW METHOD ]

Digital Forensic EC COUNCIL
TOPICS
1.COMPUTER FORENSICS IN TODAY ‘S WORLD
2. COMPUTER FORENSICS INVESTIGATION PROCESS
3. UNDERSTANDING HARD DISKS AND FILE SYSTEMS
4. DATA ACQUISITION AND DUPLICATION
5. DEFEATING ANTI-FORENSICS TECHNIQUES
6. WINDOWS FORENSICS
7. LINUX AND MAC FORENSICS
8. NETWORK FORENSICS
9. INVESTIGATING WEB ATTACKS
10. DARK WEB FORENSICS
11. IMAGE FORENSIC
12. VIDEO FORENSICS
13. CCTV FOOTAGE FORENSIC
14. COMPROMISE SYSTEM FORENSIC
15. INTERNAL OR EXTERNAL DATA STORAGE DEVICE FILE RECOVER
16. BAD SECTOR REPAIR OR FILE DATA RECOVERY
17. INCIDENT RESPONSE
18. RAM MEMORY ANALYSIS
19. MAKE CLONES OF ANY DEVICE OR OPERATING SYSTEM
20. CLOUD FORENSICS
21. INVESTIGATING EMAIL CRIMES
22. MALWARE FORENSICS
23. MOBILE FORENSICS
24. ANDROID PHONE DATA RECOVERY (FORMAT FACTORY RESET, DELETED, WIPEOUTDATA, CLOUD ERASE E.T.C.)
25. HARDWARE DEVICE FORENSIC
26. WEB BROWSER FORENSIC LIKE CHROME, FIREFOX, OPERA, SAFARI, E.T.C.) >>(DONE)
27. MAKING OF DIGITAL FORENSIC REPORT AFTER INVESTIGATION.
28. CONCLUSION

RED TEAMING TRAINING
TOPICS
SOCIAL-MEDIA ACOUNT ADVANCED
ADVANCED DNS TECHNIQ
HARDWARE PENETRETESTING
BEEF EPLOITATION ADVANCED
AUTOREASPONSE RED TEAMER EXPLOITATION
15+ MORE ATTACKS PRACKTIKAL…

BUG-BOUNTY
TOPICS
INTRODUCTION OF WEBSITE HACKING
- CREATE A HACKING SERVER
FIND DATA TAMPARING VULNERBILITY
OPEN REDIRECT REAL WEBSITE
OPEN REDIRECT TO XSS WEBSITE
CSRF VULNRBILITY
PASSWORD RESET POISONING
ACCOUNT TAKE OVER PASSWORD
FIND XSS REAL WEBSITE
AUTOMATIC FIND XSS
BYPASS OTP REAL WEBSITE
LOGIN WITHOUT PASSWORD USER ACCOUNT
FILE UPLOAD VULNRBILITY
BYPASS PAYMENT GATEWAY WEBSITE
FIND LFI REAL WEBSITE
FIND SQL INJECION
FIND ADMIN CREDENTIAL REAL WEBSITE
AUTO LOGIN ADMIN ACCOUNT
THANK YOU NOTE

Networking/Python/ Java/Html/C++
TOPICS
NETWORKING CCNA BASIC TO ADVANCED LEVEL IN HINDI AND MARATHI
ABOUT US
This is a cyber security operation centre open around-the-clock to address your issues.
CyberEdic (Investigation & Training Center) is your trusted partner for cyber crime investigation, security services, and advanced technical training. We are committed to safeguarding digital spaces and equipping professionals with essential skills to tackle today’s cyber threats.
- Cyber Crime Consultancy
- Cyber Fraud Security Services
- Cyber Awareness
- User & Documents Verification
- Social Accounts Ban/Unban Services
- Cyber Fraud Investigation
- Data Recovery
- Our Live Certified Training
OUR SERVICES

CYBER FRAUD SAFETY

CYBER AWARENESS

HOW TO SECURE FOR FAKE ACCOUNTS

Documents how to secure

Social Accounts Safety

Our Live Certified Training Advance Courses
OUR SERVICES

Cyber Fraud Investigation

Cyber Awareness

Fake Social Media Accounts Investigation

User & Documents Verification

Social Accounts Unban Services
