Training Courses

Training Courses
Computer Hacking and Forensic Investigation(CHFI) V 3.0

Code: CHFIV3
Type: IT InstructorLed Courses
Category: EC-Council
The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

This course prepares for the CHFI 312-49 exam.


Duration: 35
Location: EDITC & MMC Conference Center, 16 Imvrou Street, 1055 Nicosia
Language: Greek
Attendance: 1-12
 

Topics
Module 01: Computer Forensics in Today’s World
Module 02: Law and Computer Forensics
Module 03: Computer Investigation Process
Module 04: First Responder Procedure
Module 05 : CSIRT
Module 06: Computer Forensic Lab
Module 07: Understanding File Systems and Hard Disks
Module 08: Understanding Digital Media Devices
Module 09: Windows, Linux and Macintosh Boot Processes
Module 10: Windows Forensics
Module 11: Linux Forensics
Module 12: Data Acquisition and Duplication
Module 13: Computer Forensic Tools Part I- Software Forensics Tools Part II- Hardware Forensics Tools
Module 14: Forensics Investigations Using Encase
Module 15: Recovering Deleted Files and Deleted partitions Part I: Recovering Deleted Files Part II: Recovering Deleted Partitions
Module 16: Image Files Forensics
Module 17: Steganography
Module: 18: Application Password Crackers
Module 19: Network Forensics and Investigating Logs
Module 20: Investigating Network Traffic
Module 21: Investigating Wireless Attacks
Module 22: Investigating Web Attacks
Module 23: Router Forensics
Module 24: Investigating DoS Attacks
Module 25: Investigating Internet Crimes
Module 26: Tracking E-mails and Investigating E-mail Crimes
Module 27: Investigating Corporate Espionage
Module 28: Investigating Trademark and Copyright Infringement
Module 29: Investigating sexually harassment incidents
Module 30: Investigating Child Pornography
Module 31: PDA Forensics
Module 32: iPod Forensics
Module 33: Blackberry Forensics
Module 34: Investigative Reports
Module 35: Becoming an Expert Witness


Who Should Attend
•Police and other law enforcement personnel,
•Defense and Military personnel
•e-Business Security professionals
•Systems administrators
•Web Adminsitrators
•Legal professionals
•Banking
•Insurance and other professionals
•Government agencies
•IT managers
•Small and medium size managers


Purpose
The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?"

This course prepares for the CHFI 312-49 exam.


Objectives
Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. The aim of this course is to become able to identify, track, and prosecute the cyber-criminal.

Prerequisites
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

Methodology
1. Training
2.Discusions
3. Labs
4.Exercises


Equipment
1.EC-Council approved training material
2. Personal Computers
3.Video Projector
4. Printer
4. Whiteboard and flip charts


TimeTable
Day 1
•Module 01: Computer Forensics in Today’s World
•Module 02: Law and Computer Forensics
•Module 03: Computer Investigation Process
•Module 04: First Responder Procedure
•Module 05 : CSIRT
•Module 06: Computer Forensic Lab
•Module 07: Understanding File Systems and Hard Disks

Day 2
•Module 08: Understanding Digital Media Devices
•Module 09: Windows, Linux and Macintosh Boot Processes
•Module 10: Windows Forensics
•Module 11: Linux Forensics
•Module 12: Data Acquisition and Duplication
•Module 13: Computer Forensic Tools Part I- Software Forensics Tools Part II- Hardware Forensics Tools
•Module 14: Forensics Investigations Using Encase

Day 3
•Module 15: Recovering Deleted Files and Deleted partitions Part I: Recovering Deleted Files
•Part II: Recovering Deleted Partitions
•Module 16: Image Files Forensics
•Module 17: Steganography
•Module: 18: Application Password Crackers
•Module 19: Network Forensics and Investigating Logs
•Module 20: Investigating Network Traffic
•Module 21: Investigating Wireless Attacks

Day 4
•Module 22: Investigating Web Attacks
•Module 23: Router Forensics
•Module 24: Investigating DoS Attacks
•Module 25: Investigating Internet Crimes
•Module 26: Tracking E-mails and Investigating E-mail Crimes
•Module 27: Investigating Corporate Espionage
•Module 28: Investigating Trademark and Copyright Infringement

Day 5
•Module 29: Investigating sexually harassment incidents
•Module 30: Investigating Child Pornography
•Module 31: PDA Forensics
•Module 32: iPod Forensics
•Module 33: Blackberry Forensics
•Module 34: Investigative Reports
•Module 35: Becoming an Expert Witness



Find Training Courses
Name
Type
v
Category
v
 

© EDUCATION & INFORMATION TECHNOLOGY CENTRE (EDITC). All Rights Reserved. Developed by CMP POLYMEDIA LTD