Cyber Security Forensic Investigator & Ethical Hacker Package

Course

Online

Save 50%
£ 250 VAT inc.

Description

  • Type

    Course

  • Level

    Intermediate

  • Methodology

    Online

  • Class hours

    40h

  • Duration

    1 Year

  • Start date

    Different dates available

  • Online campus

    Yes

  • Support service

    Yes

  • Virtual classes

    Yes

Learn to think like a hacker and apply that knowledge to building security provisions that deter cybercriminals with the Cyber Security Forensic Investigator & Ethical Hacker package. Combining the Computer Hacking Forensic Investigator and Certified Ethical Hacker certification courses, this package helps students learn the tricks used by cybercriminals to access corporate systems and how they can be stopped. Students will also master the science of forensic investigations, helping to gather the necessary evidence to prosecute hackers in the event of an attempted or successful network breach.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Understanding the ethics involved in white hat hacking.
How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked early.
How to scan networks to identify potential vulnerabilities.
Using enumeration to catalogue system resources and potential routes to breach.
Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks.
The role of social engineering to steal confidential information directly from employees.
Using sniffers and session hijacking to mask illegal access to system resources.
Web-based attacks that can take online systems down.
How wireless network security can be breached.
How hackers avoid protective measures like IDS, firewalls and honeypots.
Applying network forensic techniques to identify and catch hackers.
Using cryptography and steganography to protect data.
How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate.

Network engineers and IT security professionals who need to understand hacking techniques so that they can better protect resources.
Network engineers and IT security professionals responsible for investigating network perimeter breaches and data theft incidents.
IT professionals who need to earn the certifications to prove their experience in the field of network security.
Network security consultants who want to offer ethical hacking services to clients.
Network security professionals tasked with testing defences and identifying potential vulnerabilities.
Individuals who would like to learn the skills and techniques required to make a career change into IT security.

The Cyber Security Forensic Investigator & Ethical Hacker package helps students to see security issues from both sides – first as the hacker, then as a security professional trying to keep them out. This ability to understand security from both sides of the network perimeter enables learners to create more secure, more robust protective measures. Other benefits students will realise from this course include:
Hands on skills and experience that will allow security professionals to properly manage breaches and cyberattacks.
The necessary forensic and legal awareness to ensure that evidence of cybercrimes is preserved for potential legal proceedings.
A raised level of awareness that can be used to train other employees to share security responsibilities and implement new policies.
An improved skill set that will help employees be more productive and efficient.
Increased employment opportunities within the network security and forensic auditing arena.
With ethical hackers and security specialists earning an average of $100,000 (£65,000) each year, the investment in the Cyber Security Forensic Investigator & Ethical Hacker package will quickly repay itself. The package is also a pre-requisite for professionals who want to sit their ISACA CISA certification exams.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Access
  • Network
  • Hacker
  • Hacking
  • Web
  • Systems
  • Network Training
  • Access Control
  • Web Development
  • Web Programming
  • Web Browsing

Course programme

Units of Study

Computer Hacking Forensic Investigator
  • Intro to Course
  • Intro to Forensics
  • Forensics Investigation Process
  • Searching and Seizing
  • Digital Evidence
  • First Responder Procedures
  • Forensic Lab
  • Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Using Access Data FTK and Special Steps
  • EnCase
  • Stenography
  • Passwords
  • Log Correlation
  • Network Forensics
  • Wireless Attacks
  • Web Attacks
  • Email Crimes
  • Mobile Investigation
  • Investigation Reports
  • Expert Witness
Certified Ethical Hacker
  • Intro
  • PretestIntro
  • Questions
  • PretestSummary
  • Intro to Ethical Hacking
  • Footprinting & Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans & Backdoors
  • Viruses & Worms
  • Denial of Service
  • Social Engineering
  • Snffers
  • Session Hijacking
  • Hacking Web Servers
  • Web Application Vulnerabilities
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls & Honeypots
  • Buffer Overflows
  • Cryptography & Steganography
  • Metasploit for Penertration Testing
  • Business Process
  • Lab Suggestions

Cyber Security Forensic Investigator & Ethical Hacker Package

£ 250 VAT inc.