Processing your application. Please be patient while we make sure we receive every piece of it.
Information Security
Certified Hacking Forensic Investigator iClass (CHFI)
5 Day(s)
REQUEST
PRIVATE SESSION
COURSE DESCRIPTION
OVER
VIEW
+
OBJEC
TIVES
+
AUD
IENCE
+
PRERE
QUISI
TES
+
OUT
LINE
+
Course OverviewEC-Council | iClass Online Event Venue is a robust learning environment designed to enhance the remote learning experience of our Information Security Students. iClass encompasses current technologies in online Web Conferencing, VOIP Services, distributed Video Platforms, and our new iLabs product allowing every student full hands on access to live servers to conduct labs in virtualized environments. By combining live instruction, classroom interactivity, remote control capabilities, live hands-on labs, and the power of the world wide web, students now have more learning options than ever when it comes to EC-Council titles. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases. Electronic evidence is critical in the following situations: • Disloyal employees • Computer break-ins • Possession of pornography • Breach of contract • Industrial espionage • E-mail Fraud • Bankruptcy • Disputed dismissals • Web page defacements • Theft of company documentsComputer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. The CHFI course will benefit: • Police and other law enforcement personnel • Defense and Military personnel • e-Business Security professionals • Systems administrators • Legal professionals • Banking, Insurance and other professionals • Government agencies • IT managersAudiencePolice and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers PrerequisitesIt is strongly recommended that you attend the CEH class before enrolling into CHFI program.
Price: $3,330
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com

Certified Hacking ForensicInvestigator iClass (CHFI)

Topics

Module 01:Computer Forensics in Today’s World

Module 02:Law and Computer Forensics

Module 03:Computer Investigation Process

Module 04:First Responder Procedure

Module 05: CSIRT

Module 06:Computer Forensic Lab

Module 07:Understanding File Systems and Hard Disks

Module 08:Understanding Digital Media Devices

Module 09:Windows, Linux and Macintosh Boot Processes

Module 10:Windows Forensics

Module 11:Linux Forensics

Module 12:Data Acquisition and Duplication

Module 13:Computer Forensic Tools

Module 14:Forensics Investigations Using Encase

Module 15:Recovering Deleted Files and Deleted Partitions

Module 16: Image Files Forensics

Module 17:Steganography

Module:18: Application Password Crackers

Module 19:Network Forensics and Investigating Logs

Module 20:Investigating Network Traffic

Module 21:Investigating Wireless Attacks

Module 22:Investigating Web Attacks

Module 23:Router Forensics

Module 24:Investigating DoS Attacks

Module 25:Investigating Internet Crimes

Module 26:Tracking E-mails and Investigating E-mail Crimes

Module 27:Investigating Corporate Espionage

Module 28:Investigating Trademark and Copyright Infringement

Module 29:Investigating Sexual Harassment Incidents

SITE MAP