Your Cart Is Empty
Home > Technical Courses > Cyber Security > Computer Hacking Forensic Investigator (CHFI)
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective.
This course includes the exam voucher for the CHFI - Certified Professional Certification Exam (312-49).The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and the course enables students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.The CHFI certification will give participates (Law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.) the necessary skills to perform an effective digital forensics investigation.
Category
ID
Duration
Level
Price
Cyber Security
13175
5 Day(s)
Intermediate
$3,875.00
Objectives
Lesson objectives help students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:· Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling· Perform anti-forensic methods detection· Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred· Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.· Identify & check the possible source / incident origin.· Recover deleted files and partitions in Windows, Mac OS X, and Linux· Conduct reverse engineering for known and suspected malware files· Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Lesson 1: Computer Forensics in Today's WorldLesson 2: Computer Forensics Investigation ProcessLesson 3: Searching and Seizing ComputersLesson 4: Digital EvidenceLesson 5: First Responder ProceduresLesson 6: Computer Forensics LabLesson 7: Understanding Hard Disks and File SystemsLesson 8: Windows ForensicsLesson 9: Data Acquisition and DuplicationLesson 10: Recovering Deleted Files and Deleted PartitionsLesson 11: Forensics Investigation Using AccessData FTKLesson 12: Forensics Investigation Using EnCaseLesson 13: Steganography and Image File ForensicsLesson 14: Application Password CrackersLesson 15: Log Capturing and Event CorrelationLesson 16: Network Forensics, Investigating Logs and Investigating Network TrafficLesson 17: Investigating Wireless AttacksLesson 18: Investigating Web AttacksLesson 19: Tracking Emails and Investigating Email CrimesLesson 20: Mobile ForensicsLesson 21: Investigative ReportsLesson 22: Becoming an Expert Witness
Questions?
CHFI - Certified Professional Certification
To ensure the successful completion of ‘Computer Hacking Forensic Investigator’ we recommend completion of one of the following courses, or equivalent knowledge:· Certified Ethical Hacker v9
Productivity Point Learning Solutions evolved out of a desire to increase our outreach both nationally and internationally.
Productivity Point Headquarters 1580 Sawgrass Corporate Parkway Suite 205 Sunrise, Florida 33323 United States
Contact T 1-844-238-8607 P 1-954-425-6141 F 1-954-928-9057 E info@productivitypointls.com