MestoOnline - video recorded training
DatumTermin u najavi
VremeTermin u najavi
Cena82.800,00 + PDV
Prijavi se

CHFI -Computer Hacking Forensic Investigator

Course Overview

CHFI v9 covers detailed methodological approach to computer forensics and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by the cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.

Who should attend CHFI

  • Anyone interested in cyber forensics/investigations
  • Attorneys, legal consultants, and lawyers
  • Law enforcement officers
  • Police officers
  • Federal/ government agents
  • Defense and military
  • Detectives/ investigators
  • Incident response team members
  • Information security managers
  • Network defenders
  • IT professionals, IT directors/ managers
  • System/network engineers
  • Security analyst/ architect/ auditors/ consultants

Prerequisites for CHFI

  • IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response
  • Prior completion of EC-Council Certified Ethical Hacker v11 (CEH12) training would be an advantage

Duration

Lectures: 1 year access to video lectures

Labs: 6 months access to labs

  • A voucher for taking the official CCISO exam is included in the price

Course Content

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Data Acquisition and Duplication
  • Defeating Anti-Forensics Techniques
  • Operating System Forensics
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating Email Crimes
  • Mobile Forensics
  • Forensics Report Writing and Presentation

 

Leave a Reply