Course name:
Computer Hacking Forensic Investigator (CHFI)
Description:
CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
Duration:
40 Hours
Audience:
Information Security Professionals, Auditors
Prerequisites:
Information Security
Course outline:
<p>CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure</p> <p>Learning Objective</p> <p>The students will gain application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. It will prepare the students to pass the exam.</p> <p>Outline</p> <p>Module 1: Computer Forensics Introduction</p> <p>Module 2: Forensics Investigation Process</p> <p>Module 3: Searching and Seizing</p> <p>Module 4: Digital Evidence</p> <p>Module 5: First Responder Procedures</p> <p>Module 6: Forensics Lab</p> <p>Module 7: Hard Disks and File Systems</p> <p>Module 8: Windows Forensics</p> <p>Module 9: Data Acquisition and Duplication</p> <p>Module 10: Recovering Deleted Files and Partitions</p> <p>Module 11: Using Access Data FTK</p> <p>Module 12: Using EnCase</p> <p>Module 13: Steganography</p> <p>Module 14: Password Crackers</p> <p>Module 15: Log Correlation</p> <p>Module 16: Network Forensics</p> <p>Module 17: Wireless Attacks</p> <p>Module 18: Web Attacks</p> <p>Module 19: Email Crimes</p> <p>Module 20: Mobile Investigation</p> <p>Module 21: Investigative Reports</p> <p>Module 22: Expert Witness</p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.