Course Details

Your Growth, Our Mission

COMPUTER HACKING FORENSICS INVESTIGATOR
Course Description
The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?"

The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Pro metric exam to receive the CHFI certification.

Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Module 01: Computer Forensics in Today’s World

Module 02: Law and Computer Forensics

Module 03: Computer Investigation Process

Module 04: First Responder Procedure

Module 05: CSIRT

Module 06: Computer Forensic Lab

Module 07: Understanding File Systems and Hard Disks

Module 08: Understanding Digital Media Devices

Module 09: Windows, Linux and Macintosh Boot Processes

Module 10: Windows Forensics

Module 11: Linux Forensics

Module 12: Data Acquisition and Duplication

Module 13: Computer Forensic Tools

Module 14: Forensics Investigations Using Encase

Module 15: Recovering Deleted Files and Deleted partitions

Module 16: Image Files Forensics

Module 17: Steganography

Module: 18: Application Password Crackers

Module 19: Network Forensics and Investigating Logs

Module 20: Investigating Network Traffic

Module 21: Investigating Wireless Attacks

Module 22: Investigating Web Attacks

Module 23: Router Forensics

Module 24: Investigating DoS Attacks

Module 25: Investigating Internet Crimes

Module 26: Tracking E-mails and Investigating E-mail Crimes

Module 27: Investigating Corporate Espionage

Module 28: Investigating Trademark and Copyright Infringement

Module 29: Investigating sexually harassment incidents

Module 30: Investigating Child Pornography

Module 31: PDA Forensics

Module 32: iPod Forensics

Module 33: Blackberry Forensi

Module 34: Investigative Reports

Module 35: Becoming an Expert Witness

Request Info

Course Rounds

5 Days
Code Date Venue Fees Action

Prices don't include VAT

Related Courses

Your Growth, Our Mission

Contact Us

Contact us to meet all your inquiries and needs, as our professional team is pleased to provide immediate support and advice to ensure you achieve your goals and facilitate your experience with us in the best possible way.

UAE
1st floor, Incubator Building, Masdar City, Abu Dhabi, UAE
Office
00971-2-6446633
Mobile
00971-50-5419377
E-mail
info@btsconsultant.com
Working Hours
Sun to Fri 09:00 AM to 06:00 PM