- Back to Home »
- Security , Security Hacking »
- CHFI (Computer Hacking Forensics Investigator)
Posted by : Unknown
Thursday, 14 August 2014
CHFI (Computer Hacking
Forensics Investigator)
EC-Council releases the most
advanced Computer Forensic Investigation program in the world. CHFIv8 presents
a detailed methodological approach to computer forensics and evidence analysis.
It is a comprehensive course covering major forensic investigation scenarios
that enable students to acquire hands-on experience on various forensic
investigation techniques and standard tools necessary to successfully carry-out
a computer forensic investigation. Battles between corporations, governments,
and countries are no longer fought using physical force. Cyber war has begun
and the consequences can be seen in everyday life. With the onset of
sophisticated cyber-attacks, the need for advanced cyber security and
investigation training is a mandate in the present day. If you or your
organization requires the knowledge or skills to identify, track, and prosecute
the cybercriminals, then this is the course for you.This course helps students
to excel in digital evidence acquisition, handling and analysis in a
forensically sound manner. Acceptable in a court of law, these skills will lead
to successful prosecutions in various types of security incidents such as data
breaches, corporate espionage, insider threats and other intricate cases
involving computer systems.
In
preparation to earn an CHFI certification, Mazenet recommends a training path
based on a candidate’s background:
·
Computer
Forensics in Today’s World
·
Computer
Forensics Investigation Process
·
Searching
and Seizing Computers
·
Digital
Evidence
·
First
Responder Procedures
·
Computer
Forensics Lab
·
Understanding
Hard Disks and File Systems
·
Windows
Forensics
·
Data
Acquisition and Duplication
·
Recovering
Deleted Files and Deleted Partitions
·
Forensics
Investigation Using AccessData FTK
·
Forensics
Investigation Using EnCase
·
Steganography
and Image File Forensics
·
Application
Password Crackers
·
Log
Capturing and Event Correlation
·
Network
Forensics, Investigating Logs and Investigating Network Traffic
·
Investigating
Wireless Attacks
·
Investigating
Web Attacks
·
Tracking
Emails and Investigating Email Crimes
·
Mobile
Forensics
·
Investigative
Reports
·
Becoming
an Expert Witness