CHFI: Computer Hacking Forensic Investigator
The CHFI course will give participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute. Many of todays top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Todays battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.
DESTINATÁRIOS
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers
PRÉ-REQUISITOS
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.
PROGRAMA
Computer Forensics in Today’s World
Law and Computer Forensics
Computer Investigation Process
irst Responder Procedure
CSIRT
Computer Forensic Lab
Understanding File Systems and Hard Disks
Understanding Digital Media Devices
Windows, Linux and Macintosh Boot Processes
Windows Forensics
Linux Forensics
Data Acquisition and Duplication
Computer Forensic Tools
Forensics Investigations Using Encase
Recovering Deleted Files and Deleted partitions
Image Files Forensics
Steganography
Application Password Crackers
Network Forensics and Investigating Logs
Investigating Network Traffic
Investigating Wireless Attacks
Investigating Web Attacks
Router Forensics
Investigating DoS Attacks
Investigating Internet Crimes
Tracking E-mails and Investigating E-mail Crimes
Investigating Corporate Espionage
Investigating Trademark and Copyright Infringement
Investigating sexually harassment incidents
Investigating Child Pornography
PDA Forensics
iPod Forensics
Blackberry Forensics
Investigative Reports
Becoming an Expert Witness
Solicite mais informação
Inscreva-se neste curso




