Join Us:       
     Trainings | Computer Hacking Forensic Investigator
 
Course Code: HF 01 (Computer Hacking Forensic Investigator )                                                 Duration: 03 Days
 
Objective
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
 
Course Contents
  • Module 01: Computer Forensics in Today’s World
  • Module 02: Law and Computer Forensics
  • Module 03: Computer Investigation Process
  • Module 04: First Responder Procedure
  • Module 05: CSIRT
  • Module 06: Computer Forensic Lab
  • Module 07: Understanding File Systems and Hard Disks
  • Module 08: Understanding Digital Media Devices
  • Module 09: Windows, Linux and Macintosh Boot Processes
  • Module 10: Windows Forensics
  • Module 11: Linux Forensics
  • Module 12: Data Acquisition and Duplication
  • Module 13: Computer Forensic Tools
    • Part I: Software Forensics Tools
    • Part II: Hardware Forensics Tools
  • Module 14: Forensics Investigations Using Encase
  • Module 15: Recovering Deleted Files and Deleted partitions
    • Part I: Recovering Deleted Files
    • Part II: Recovering Deleted Partitions
  • Module 16: Image Files Forensics
  • Module 17: Steganography
  • Module 18: Application Password Crackers
  • Module 19: Network Forensics and Investigating Logs
  • Module 20: Investigating Network Traffic
  • Module 21: Investigating Wireless Attacks
  • Module 22: Investigating Web Attacks
  • Module 23: Router Forensics
  • Module 24: Investigating DoS Attacks
  • Module 25: Investigating Internet Crimes
  • Module 26: Tracking E-mails and Investigating E-mail Crimes
  • Module 27: Investigating Corporate Espionage
  • Module 28: Investigating Trademark and Copyright Infringement
  • Module 29: Investigating sexually harassment incidents
  • Module 30: Investigating Child Pornography
  • Module 31: PDA Forensics
  • Module 32: iPod Forensics
  • Module 33: Blackberry Forensics
  • Module 34: Investigative Reports
  • Module 35: Becoming an Expert Witness
 
 
 

  Consultancy Options
 
 
 
 
  Trainings
 
 
 
 
Home - About - Site Map - Contact Website Design: Soft Solutions
Copyrights 2010. Quality Management System.9000