Computer Hacking Forensic Investigator v8



Similar documents
EC-Council Ethical Hacking and Countermeasures

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

How To Get A Computer Hacking Program

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory Course 6426C: Three days

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Hands-On How-To Computer Forensics Training

Sales and Marketing in Microsoft Dynamics AX 2012

Scene of the Cybercrime Second Edition. Michael Cross

Designing a Data Solution with Microsoft SQL Server 2014

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

INFORMATION SECURITY TRAINING CATALOG (2015)

CYBER FORENSICS (W/LAB) Course Syllabus

80425: Intelligent Data Management Framework in Microsoft Dynamics AX 2012

Storage and High Availability with Windows Server

Designing Self-Service Business Intelligence and Big Data Solutions

Course 6425C: Five days

Certified Secure Computer User

Installing and Configuring Windows Server 2012

Course Server Virtualization with Windows Server Hyper-V and System Center

Certified Digital Forensics Examiner

Hackers are here. Where are you?

Certified Digital Forensics Examiner

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Administering Microsoft SQL Server Databases

information security and its Describe what drives the need for information security.

(Instructor-led; 3 Days)

Developing Windows Azure and Web Services

80429: Travel and Expense Management in Microsoft Dynamics AX 2012

Loophole+ with Ethical Hacking and Penetration Testing

Certified Digital Forensics Examiner

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Computer Forensics. Securing and Analysing Digital Information

A Practical Approach for Evidence Gathering in Windows Environment

How To Manage A System Center 2012 R2 Operation Manager

Implementing an Advanced Server Infrastructure

Beta: Implementing a Data Warehouse with Microsoft SQL Server 2012

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

InfoSec Academy Forensics Track

Certified Cyber Security Analyst VS-1160

MSc Computer Security and Forensics. Examinations for / Semester 1

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Course Title: Computer Forensic Specialist: Data and Image Files

Digital Forensic Techniques

Course Designing and Deploying Microsoft Exchange Server 2016

10232: Designing and Developing Microsoft SharePoint Server 2010 Applications

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Incident Response. Six Best Practices for Managing Cyber Breaches.

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Course 55115: Planning, Deploying and Managing Microsoft Project Server 2013

FORBIDDEN - Ethical Hacking Workshop Duration

EC-Council Certified Security Analyst (ECSA)

Course 80339: Bill of Materials in Microsoft Dynamics AX 2012

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Incident Response and Computer Forensics

Master of Science in Information Systems & Security Management. Courses Descriptions

Implementing a Data Warehouse with Microsoft SQL Server

Logging In: Auditing Cybersecurity in an Unsecure World

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Bellevue University Cybersecurity Programs & Courses

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

Overview of Computer Forensics

CERTIFIED DIGITAL FORENSICS EXAMINER

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Introduction to Cyber Security / Information Security

Hackers are here. Where are you?

Windows 7, Enterprise Desktop Support Technician

NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

CSIRT Introduction to Security Incident Handling

ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane

Unit 3 Cyber security

55042: SharePoint 2013 Business Intelligence

State of the art of Digital Forensic Techniques

Detailed Description about course module wise:

RMAR Technologies Pvt. Ltd.

What is Digital Forensics?

Introduction to Azure for Developers

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Incident Response and Forensics

Transcription:

CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyberattacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling

and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems. Who Should Attend The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response. Duration: 5 days (9:00 5:00) Certification: The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification. Course outline CHFIv8: Module 01: Searching and Seizing Computers Searching and Seizing Computers without a Warrant Searching and Seizing Computers with a Warrant The Electronic Communications Privacy Act Electronic Surveillance in Communications Networks Evidence Module 02: Digital Evidence Digital Data Types of Digital Data Rules of Evidence Electronic Devices: Types and Collecting Potential Evidence Digital Evidence Examination Process Electronic Crime and Digital Evidence Consideration by Crime Category Module 03: First Responder Procedures Electronic Evidence First Responder Roles of First Responder Electronic Devices: Types and Collecting Potential Evidence First Responder Toolkit First Response Basics Securing and Evaluating Electronic Crime Scene Conducting Preliminary Interviews

Documenting Electronic Crime Scene Collecting and Preserving Electronic Evidence Packaging and Transporting Electronic Evidence Reporting the Crime Scene Note Taking Checklist First Responder Common Mistakes Module 04: Windows Forensics Collecting Volatile Information Collecting Non-volatile Information Windows Memory Analysis Windows Registry Analysis Cache, Cookie, and History Analysis MD5 Calculation Windows File Analysis Metadata Investigation Text Based Logs Other Audit Events Forensic Analysis of Event Logs Windows Password Issues Forensic Tools Module 05: Recovering Deleted Files and Deleted Partitions Recovering the Deleted Files File Recovery Tools for Windows File Recovery Tools for MAC File Recovery Tools for Linux Recovering the Deleted Partitions Partition Recovery Tools Module 06: Forensics Investigation using AccessData FTK Overview and Installation of FTK FTK Case Manager User Interface FTK Examiner User Interface Starting with FTK FTK Interface Tabs Adding and Processing Static, Live, and Remote Evidence Using and Managing Filters Using Index Search and Live Search Decrypting EFS and other Encrypted Files

Working with Reports Module 07: Application Password Crackers Password Cracking Concepts Types of Password Attacks Classification of Cracking Software Systems Software vs. Applications Software System Software Password Cracking Application Software Password Cracking Password Cracking Tools Module 08: Log Capturing and Event Correlation Computer Security Logs Logs and Legal Issues Log Management Centralized Logging and Syslogs Time Synchronization Event Correlation Log Capturing and Analysis Tools Module 09: Network Forensics, Investigating Logs and Investigating Network Traffic Network Forensics Network Attacks Log Injection Attacks Investigating and Analyzing Logs Investigating Network Traffic Traffic Capturing and Analysis Tools Documenting the Evidence Gathered on a Network Module 10: Investigating Web Attacks Introduction to Web Applications and Webservers Web Logs Web Attacks Web Attack Investigation Web Attack Detection Tools Tools for Locating IP Address Module 11: Tracking Emails and Investigating Email Crimes Email System Basics Email Headers Steps to Investigate Email Forensics Tools

Laws and Acts against Email Crimes Module 12: Mobile Forensics Mobile Phone Mobile Operating Systems Mobile Forensics Mobile Forensic Process Mobile Forensics Software Tools Mobile Forensics Hardware Tools Module 13: Investigative Reports Computer Forensics Report Computer Forensics Report Template Investigative Report Writing Sample Forensics Report Report Writing Using Tools Module 14: Becoming an Expert Witness Expert Witness Types of Expert Witnesses Scope of Expert Witness Testimony Evidence Processing Rules for Expert Witness General Ethics While Testifying