C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR



Similar documents
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Computer Hacking Forensic Investigator v8

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council Ethical Hacking and Countermeasures

How To Get A Computer Hacking Program

Hackers are here. Where are you?

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Course Title: Computer Forensic Specialist: Data and Image Files

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

Hackers are here. Where are you?

Hands-On How-To Computer Forensics Training

Certified Digital Forensics Examiner

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

CERTIFIED DIGITAL FORENSICS EXAMINER

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

EC-Council Certified Security Analyst (ECSA)

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Analyze. Secure. Defend. Do you hold ECSA credential?

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Table of Contents. Introduction. Audience. At Course Completion

Course 50322B: Configuring and Administering Windows 7

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Security Intelligence Services. Cybersecurity training.

To Catch a Thief: Computer Forensics in the Classroom

Configuring and Administering Windows 7

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

MSc Computer Security and Forensics. Examinations for / Semester 1

Windows 7, Enterprise Desktop Support Technician

Minnesota State Community and Technical College Detroit Lakes Campus

Certified Cyber Security Analyst VS-1160

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

EC-Council. Certified Ethical Hacker. Program Brochure

Scene of the Cybercrime Second Edition. Michael Cross

Design and Implementation of a Live-analysis Digital Forensic System

CYBER FORENSICS (W/LAB) Course Syllabus

ASK PC Certified Information Systems Security Expert - CISSE

Ten Deadly Sins of Computer Forensics

information security and its Describe what drives the need for information security.

Introduction to Cyber Security / Information Security

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

e-discovery Forensics Incident Response

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University

Computer and Information Science

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Computer Forensics as an Integral Component of the Information Security Enterprise

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Incident Response and Computer Forensics

70250 Graduate Certificate in Digital Forensics

Implementing and Supporting Microsoft Windows XP Professional

CTC 328: Computer Forensics

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

LabSim. Anytime, anywhere learning. self-paced learning.

What is Digital Forensics?

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Online and Classroom

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Services. Computer Forensic Investigations

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

RealPresence Platform: Installation, Configuration and Troubleshooting - RPIIT202

Technical Testing. Network Testing DATA SHEET

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Digital Forensic Techniques

Certified Cyber Security Analyst VS-1160

CompTIA Security+ In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.

NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP

BIT Course Description

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

WILLIAM OETTINGER PHONE (702)

Getting Physical with the Digital Investigation Process

Design and Implementation of Digital Forensics Labs:

Loophole+ with Ethical Hacking and Penetration Testing

Future of Digital Forensics: A Survey of Available Training

Training Course ECSA/LPT

Network/Internet Forensic and Intrusion Log Analysis

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Computing forensics: a live analysis

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/ Fax: 802/

Cyber Learning Solutions

Incident Response and Forensics

The fast track to top skills and top jobs in cyber. Guaranteed.

Transcription:

Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8

Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer forensics If you desire to acquire the knowledge or skill set to identify, track and bring the cyber criminals to book, then this course is the right choice for you CHFI, the most sorted information security certification in Computer Hacking Forensic Investigation that reinforces skills of the new generation cyber sleuths

Page: 01 Course Description: releases the most advanced program in the world. CHFIv8 presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and we can also see the consequences in our daily lives. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you. This course helps forensic investigators to excel in incident handling and investigate various types of security incidents such as data breaches, latest persistent security issues, insider employee threats and intricate digital forensic circumstances and cases. Target Audience: CHFI program is intended for leading technology professionals such as defence and military personnel, e-business security professionals, legal professionals, banking and insurance etc. in tracing out the devastative security breakdown issues across a span of IT industries. Prerequisites Duration It is strongly recommended that you attend the CEH class before enrolling into CHFI program. 5 days (9:00 5:00) Certification The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification. CHFI, I officially lead the team Being of security consultancy and Forensic investigation in the current company. Definitely, the certification made me focus on the subject area and help serve our customers in a more professional way. - Jacky So Yui Hung, CHFI, Network Security Consultants Limited.

Key features of CHFI v8 Page: 02 Updated Content CHFI v8 contains updated content on rapidly evolving investigation techniques. Organized Content The well-designed content enhances the learning experience and ensures better understanding of key concepts and investigation methodologies. Classroom Friendly The well-structured slides create an interactive classroom environment. Illustration Rich The slides contain diagrams and illustrations to create better understanding of investigation process and actual attack paths. New Investigation Techniques CHFI v8 provides in-depth knowledge of new techniques and tools used in forensic investigation to meet the toughest challenges in cybercrime. Investigation Tools CHFI v8 showcases hundreds of investigation tools including EnCase, Access Data FTK, and ProDiscover. Sample Evidence Files CHFI v8 DVD contains a huge cache of evidence files for analysis including RAW,.dd images, video and audio files, MS Office files, systems files etc. Visual Appeal Eye-catching graphics complement the content and enhance the learning experience of the students. Lab Setup Lab setup manual provides detailed procedures to setup a lab environment complete with network environment, evidence files and other prerequisite tools. DVD-ROM Content CHFIv8 also provides a DVD-ROM with a repository of around 8 GB of latest investigation tools and security tools.

Page: 03 Version Comparison courseware has undergone tremendous improvements compared to its previous versions. We have invested 4 times more efforts in fundamental research and development since its last release, and have given CHFIv8 a complete makeover. The new version is a breakaway from earlier releases with more emphasis given on techniques and methodologies, which investigator may use successfully in computer forensic investigations. A picture is worth a thousand words and we at have enforced the saying by practicing it. The instructor slides and student manuals in CHFIv8 has it all. The new version empowers the instructors with flawless flow and outstanding diagrammatic representation of the investigation techniques, which makes it easier to teach and enables students to understand the concepts better. The CHFI Certification is an incredible asset to my company which has now a better understanding on Security issues, especially concerning vulnerability. - Frank Chow, CHFI, Automated Systems (HK) Ltd, China. Ilabs The ilabs is a subscription based service that allows students to logon to a virtualized remote machine running Windows 2008 Server to perform various exercises featured in the CHFIv8 Lab Guide. All you need is a web browser to connect and start experimenting. The virtual machine setup reduces the time and effort spent by instructors and partners prior to the classroom engagement. It is a hassle free service available 24x7 x number of days subscribed. Benefits Enables students to practice various investigation techniques in a real time and simulated environment The course tools and programs are preloaded on the ilabs machine thereby saving productive time and effort

What will you learn? Students going through CHFI training will learn: The process of investigating cyber-crime, laws involved in cyber-crime investigation, and obtaining Search Warrant How to search and seize computers with or without a warrant, how to Use Technology to obtain information, Electronic Communications Privacy Act, and Electronic Surveillance in Communications Networks Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene How to set up a computer forensics lab and tools involved in it Various file systems and how to boot a disk Gathering volatile and nonvolatile information from Windows Data acquisition and duplication rules, validation methods and tools required How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux The process involved in forensic investigation using Access Data FTK and Encase Page: Steganography and its techniques, Steganalysis, and image file forensics 04 Password Cracking Concepts, tools, types of password attacks and how to investigate password protected files Different types of log capturing, log management, time synchronization, log capturing tools How to investigate logs, network traffic, wireless attacks, and web attacks How to tack e-mails and investigate e-mail crimes Mobile forensics and mobile forensics software and hardware tools Write investigative reports The course material is up to date and very complete. It really takes you on a tripthrough the Security field. Each chapter has lab exercises and this makes you understand the stuff in the book much better. If you are working or want to work in the Information Security field this training is highly recommended. - Martin de Kok, Sr Security Officer, Netherlands.

Page: 05 Course Outline Version 8 CHFIv8 curriculum consists of 22 instructor-led training modules. 1. Computer Forensics in Today s World 2. Computer Forensics Investigation Process 3. Searching and Seizing Computers 4. Digital Evidence 5. First Responder Procedures 6. Computer Forensics Lab 7. Understanding Hard Disks and File Systems 8. Windows Forensics 9. Data Acquisition and Duplication 10. Recovering Deleted Files and Partitions 11. Forensics Investigation Using Access Data FTK 12. Forensics Investigation Using Encase 13. Steganography and Image File Forensics 14. Application Password Crackers 15. Log Capturing and Event Correlation 16. Network Forensics, Investigating Logs and Investigating Network Traffic 17. Investigating Wireless Attacks 18. Investigating Web Attacks 19. Tracking Emails and Investigating Email Crimes 20. Mobile Forensics 21. Investigative Reports 22. Becoming an Expert Witness CHFI is a certification that gives a complete overview of the process that a forensic investigator must follow when is investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techniques that can be applied to investigate an incident. - Virginia Aguilar, CHFI, KPMG, Madrid.

Page: 06 6330 Riverside Plaza Ln NW Suite 210 Albuquerque, NM 87120 Tel: +1.505.341.3228 Fax: +1.505.341.0050 http://www.eccouncil.org E-mail: info@eccouncil.org