Computer Hacking Forensic Investigator v9 (CHFI)
Course Overview
A criminal always leaves a trace of evidence behind. Become a CHFI with EC-Council’s online course on CHFI certification. This online training course certifies individuals in forensic security discipline from a vendor-neutral perspective and enhances their knowledge of digital forensics to investigate and prevent cyber attacks efficiently. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
Audience
Police and other law enforcement personnel
Defense and Military personnel
e-Business Security professionals
Systems administrators
Legal professionals
Banking, Insurance and other professionals
Government agencies
IT managers
Course Outline
Overview
Computer Forensics In Todays World
Computer Forensics In Todays World Part 2
Computer Forensics In Todays World Part 3
Computer Forensics In Todays World Part 4
Computer Forensics In Todays World Part 5
The Investigation Process
The Investigation Process Part 2
The Investigation Process Part 3
The Investigation Process Part 4
The Investigation Process Part 5
The Investigation Process Part 6
The Investigation Process Part 7
Investigative Tools Demonstration
Hard Disks And File Systems
Hard Disks And File Systems Part 2
Hard Disks And File Systems Part 3
Hard Disks And File Systems Part 4
Forensic File System Tools Demonstration
Data Acquisition And Duplication
Data Acquisition And Duplication Part 2
Data Acquisition And Duplication Part 3
Data Acquisition Tools Demonstration
Defeating Anti-Forensic Techniques
Defeating Anti-Forensic Techniques Part 2
Defeating Anti-Forensic Techniques Part 3
Defeating Anti-Forensic Techniques Part 4
Anti-Forensics Tools Demonstration
Operating System Forensics
Operating System Forensics Part 2
Operating System Forensics Part 3
Operating System Forensics Part 4
Operating System Forensics Part 5
Operating System Forensics Part 6
Network Forensics
Network Forensics Part 2
Network Forensics Part 3
Network Forensics Part 4
Investigating Web Attacks
Investigating Web Attacks Part 2
Investigating Web Attacks Part 3
Investigating Web Attacks Part 4
Investigating Web Attacks Part 5
Investigating Web Attacks Part 6
Database Forensics
Database Forensics Part 2
Cloud Forensics
Cloud Forensics Part 2
Cloud Forensics Part 3
Cloud Forensics Part 4
Malware Forensics
Malware Forensics Part 2
Investigating Email Crimes
Investigating Email Crimes Part 2
Investigating Email Crimes Part 3
Mobile Forensics
Mobile Forensics Part 2
Mobile Forensics Part 3
Forensics Report Writing And Presentation