CHFI v8 Training

Computer Hacking Forensic Investigation v8

Description
Course Structure
Entery Requirements

CEH v9 Training India

CHFI v8 presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battle between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now, the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

List of Modules

  • Module 01: Computer Forensics in Today's World
  • Module 02: Computer Forensics Investigation Process
  • Module 03: Searching and Seizing Computers
  • Module 04: Digital Evidence
  • Module 05: First Responder Procedures
  • Module 06: Computer Forensics Lab
  • Module 07: Understanding Hard Disks and File Systems
  • Module 08: Windows Forensics
  • Module 09: Data Acquisition and Duplication
  • Module 10: Recovering Deleted Files and Deleted Partitions
  • Module 11: Forensics Investigation using AccessData FTK
  • Module 12: Forensics Investigation Using EnCase
  • Module 13: Steganography and Image File Forensics
  • Module 14: Application Password Crackers
  • Module 15: Log Capturing and Event Correlation
  • Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic
  • Module 17: Investigating Wireless Attacks
  • Module 18: Investigating Web Attacks
  • Module 19: Tracking Emails and Investigating Email Crimes
  • Module 20: Mobile Forensics
  • Module 21: Investigative Reports
  • Module 22: Becoming an Expert Witness

Prerequisite

  • Security Officers
  • Police and other law enforcement personnel
  • Defense and Military personnel
  • e-Business Security professionals
  • Systems administrators
  • Legal professionals
  • Banking, Insurance and other professionals
  • Government agencies
  • IT managers

Multiple Exam Info

  • Number of Questions: 150
  • Passing Score: 70%
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM

Study Material

  • EC-Council Offical Course Ware

Duration

  • 40 Hours / 1 Months

Course reviews
  1. 4.00 out of 5

    Milan Sen

    The instructor is well versed in the attack/scanning techniques and mitigation steps.