EC-Computer Hacking Forensics Investigator

Course

In Wembley Park

Price on request

Description

  • Type

    Course

  • Location

    Wembley park

  • Duration

    5 Days

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Suitable for: Police and other law enforcement personnel, Defence and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers

Facilities

Location

Start date

Wembley Park (Middlesex)
12th Floor York House Empire Way, HA9 0PA

Start date

On request

About this course

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Description:

Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Course Synopsis:

The CHFI course consists of 35 modules which cover the following structure:

  • Module 1: Computer Forensics in Today’s World
  • Module 2: Law and Computer Forensics
  • Module 3: Computer Investigation Process
  • Module 4: First Responder Procedure
  • Module 5: CSIRT
  • Module 6: Computer Forensic Lab
  • Module 7: Understanding File Systems and Hard Disks
  • Module 8: Understanding Digital Media Devices
  • Module 9: Windows, Linux and Macintosh Boot Processes
  • Module 10: Windows Forensics
  • Module 11: Linux Forensics
  • Module 12: Data Acquisition and Duplication
  • Module 13: Computer Forensic Tools
  • Module 14: Forensics Investigations Using Encase
  • Module 15: Recovering Deleted Files and Deleted partitions
  • Module 16: Image Files Forensics
  • Module 17: Steganography
  • Module 18: Application Password Crackers
  • Module 19: Network Forensics and Investigating Logs
  • Module 20: Investigating Network Traffic
  • Module 21: Investigating Wireless Attacks
  • Module 22: Investigating Web Attacks
  • Module 23: Router Forensics
  • Module 24: Investigating DoS Attacks
  • Module 25: Investigating Internet Crimes
  • Module 26: Tracking E-mails and Investigating E-mail Crimes
  • Module 27: Investigating Corporate Espionage
  • Module 28: Investigating Trademark and Copyright Infringement
  • Module 29: Investigating sexually harassment incidents
  • Module 30: Investigating Child Pornography
  • Module 31: PDA Forensics
  • Module 32: iPod Forensics
  • Module 33: Blackberry Forensics
  • Module 34: Investigative Reports
  • Module 35: Becoming an Expert Witness

EC-Computer Hacking Forensics Investigator

Price on request