Computer Hacking Forensic Investigator (C|HFI)


@ CICRA Campus

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal."

It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Who Should Attend

Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers

Prerequisites

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

Duration

5 days (9:00 - 5:00)

Certification

The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification.

Modules Covered:

  • Module 01: Computer Forensics in Today's World
  • Module 02: Computer Forensics Investigation Process
  • Module 03: Searching and Seizing of Computers
  • Module 04: Digital Evidence
  • Module 05: First Responder Procedures
  • Module 06: Incident Handling
  • Module 07: Computer Forensics Lab
  • Module 08: Understanding Hard Disks and File Systems
  • Module 09: Digital Media Devices
  • Module 10: CD/DVD Forensics
  • Module 11: Windows Linux Macintosh Boot Process
  • Module 12: Windows Forensics I
  • Module 13: Windows Forensics II
  • Module 14: Linux Forensics
  • Module 15: Mac Forensics
  • Module 16: Data Acquisition and Duplication
  • Module 17: Recovering Deleted Files and Deleted Partitions
  • Module 18: Forensics Investigations Using AccessData FTK
  • Module 19: Forensics Investigations Using Encase
  • Module 20: Steganography
  • Module 21: Image Files Forensics
  • Module 22: Audio file forensics
  • Module 23: Video File Forensics
  • Module 24: Application Password Crackers
  • Module 25: Log Capturing and Event Correlation
  • Module 26: Network Forensics and Investigating Logs
  • Module 27: Investigating Network Traffic
  • Module 28: Router Forensics
  • Module 29: Investigating Wireless Attacks
  • Module 30: Investigating Web Attacks
  • Module 31: Investigating DoS Attacks
  • Module 32: Investigating virus, Trojan, spyware and Rootkit Attacks
  • Module 33: Investigating Internet Crimes
  • Module 34: Tracking Emails and Investigating Email Crimes
  • Module 35: PDA Forensics
  • Module 36: Blackberry Forensics
  • Module 37: iPod and iPhone Forensics
  • Module 38: Cell Phone Forensics
  • Module 39: USB Forensics
  • Module 40: Printer Forensics
  • Module 41: Investigating Corporate Espionage
  • Module 42: Investigating Computer Data Breaches
  • Module 43: Investigating Trademark and Copyright Infringement
  • Module 44: Investigating Sexual Harassment Incidents
  • Module 45: Investigating Child Pornography Cases
  • Module 46: Investigating Identity Theft Cases
  • Module 47: Investigating Defamation over Websites and Blog Postings
  • Module 48: Investigating Social Networking Websites for Evidences
  • Module 49: Investigation Search Keywords
  • Module 50: Investigative Reports
  • Module 51: Becoming an Expert Witness
  • Module 52: How to Become a Digital Detective
  • Module 53: Computer Forensics for Lawyers
  • Module 54: Law and Computer Forensics
  • Module 55: Computer Forensics and Legal Compliance
  • Module 56: Security Policies
  • Module 57: Risk Assessment
  • Module 58: Evaluation and Certification of Information Systems
  • Module 59: Ethics in Computer Forensics
  • Module 60: Computer Forensic Tools
  • Module 61: Windows Based Command Line Tools
  • Module 62: Windows Based GUI Tools
  • Module 63: Forensics Frameworks
  • Module 64: Forensics Investigation Templates 
  • Module 65: Computer Forensics Consulting Companies

Duration

5 Days

Course Level

Training

Location

Colombo

Category

Computer Security , Hacking Certifications

Contact Details

+94 11 2 596200, +94 11 2 596201

https://cicra.edu.lk

No 1002, 8th Floor , Unity Plaza , Colombo 04

Send Inquiry

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scholarship Alerts

Type "REG coursenet" and SEND to 77000

Get latest scholarships, offers & academic event alerts to your phone via SMS.

Service is available for Dialog, Mobitel, Hutch & Airtel users. Monthly (Rs. 30 + tax).

Related Courses

Institute Courses

Loading...