SMT

Resource

Center

 

Coming Soon

Security Management Technology Center Develop Elearning, FAQ , New Center...

SMT BLOG

chfi banner

CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

 

Course Description

chfi details

 

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

 

 

A CHFI v8 certified professional will be able to understand:

  • Duration: 5 Days (9:00 AM – 5:00 PM)
  • The process of investigating cyber-crime, laws involved, and the details in obtaining a search warrant.
  • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene
  • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
  • The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, Steganalysis, and image file forensics
  • Password Cracking Concepts, tools, types of password attacks and how to investigate password protected file breach
  • Different types of log capturing techniques, log management, time synchronization, log capturing tools
  • How to investigate logs, network traffic, wireless attacks, and web attacks
  • How to track e-mails and investigate e-mail crimes and many more.

 

 

 

Course Outline Version V8

  1. Computer Forensics in Today's World
  2. Computer Forensics Investigation Process
  3. Searching and Seizing Computers
  4. Digital Evidence
  5. First Responder Procedures
  6. Computer Forensics Lab
  7. Understanding Hard Disks and File Systems
  8. Windows Forensics
  9. Data Acquisition and Duplication
  10. Recovering Deleted Files and Deleted Partitions
  11. Forensics Investigation using AccessData FTK
  12. Forensics Investigation Using EnCase
  13. Steganography and Image File Forensics
  14. Application Password Crackers
  15. Log Capturing and Event Correlation
  16. Network Forensics, Investigating Logs and Investigating Network Traffic
  17. Investigating Wireless Attacks
  18. Investigating Web Attacks
  19. Tracking Emails and Investigating Email Crimes
  20. Mobile Forensics
  21. Investigative Reports
  22. Becoming an Expert Witnesschfi mainpage banner

Would you like more information ?

Click here
Would you like more information? Click here
1000 characters left

Newsletter

Subscribe to our newsletter and stay updated on the latest news and special offers!
Please wait