Edurumos
 
CHFI: Computer Hacking Forensic Investigator

The CHFI course will give participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute. Many of todays top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Todays battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.


DESTINATÁRIOS

Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers



PRÉ-REQUISITOS

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.



PROGRAMA

Computer Forensics in Today’s World

Law and Computer Forensics

Computer Investigation Process

irst Responder Procedure

CSIRT

Computer Forensic Lab

Understanding File Systems and Hard Disks

Understanding Digital Media Devices

Windows, Linux and Macintosh Boot Processes

Windows Forensics

Linux Forensics

Data Acquisition and Duplication

Computer Forensic Tools

Forensics Investigations Using Encase

Recovering Deleted Files and Deleted partitions

Image Files Forensics

Steganography

Application Password Crackers

Network Forensics and Investigating Logs

Investigating Network Traffic

Investigating Wireless Attacks

Investigating Web Attacks

Router Forensics

Investigating DoS Attacks

Investigating Internet Crimes

Tracking E-mails and Investigating E-mail Crimes

Investigating Corporate Espionage

Investigating Trademark and Copyright Infringement

Investigating sexually harassment incidents

Investigating Child Pornography

PDA Forensics

iPod Forensics

Blackberry Forensics

Investigative Reports

Becoming an Expert Witness



Solicite mais informação

Inscreva-se neste curso




Escola Digital
Rumos
Rumos Live Training