If you desire to acquire the knowledge or skill set to identify, track and bring the cyber criminals to justice, then this course is the right choice for you.
The most sought-after information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths.
This course presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner.
Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.
This course is aimed to:
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.
The certification exam has the following characteristics:
The course has the following topics:
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Searching and Seizing Computers
First Responder Procedures
Computer Forensics Lab
Understanding Hard Disks and File Systems
Data Acquisition and Duplication
Recovering Deleted Files and Deleted Partitions
Forensics Investigation Using AccessData FTK
Forensics Investigation Using EnCase
Steganography and Image File Forensics
Application Password Crackers
Log Capturing and Event Correlation
Network Forensics, Investigating Logs and
Investigating Network Traffic
Investigating Wireless Attacks
Investigating Web Attacks
Tracking Emails and Investigating Email Crimes
Becoming an Expert Witness
Our instructors are certified in different EC Council, Information Security, Cloud Computing and Risk Management disciplines and have an extensive experience in:
The design and implementation of Information Security Management Systems in the private and in the public sector.
The selection, implementation and configuration of tools and controls which support the Information Security management and which are the ones of most standing and acknowledgement in the market.
First and second level audits for Information Security Management Systems.
Teaching various ITSM, ISO, Information Security and Risk Management courses in the academic and professional field.
The participant receives a high quality, didactic material in English developed by EC-Council.
For more information about this training course (schedules, locations, costs, etc.) or any of the other IT training courses we offer, please contact us. We will be happy to assist you!