+ All Categories
Home > Documents > Computer Hacking Forensic Investigator...EC-Council’s CHFI certifies individuals in the specific...

Computer Hacking Forensic Investigator...EC-Council’s CHFI certifies individuals in the specific...

Date post: 04-Apr-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
6
Computer Hacking Forensic Investigator
Transcript
Page 1: Computer Hacking Forensic Investigator...EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The

Computer Hacking Forensic

Investigator

Page 2: Computer Hacking Forensic Investigator...EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348

Page 3: Computer Hacking Forensic Investigator...EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The

Learning Path Overview

Computer Hacking Forensic Investigator Duration:80 Hours

Schedule :Full Day Morning ( 9-5)

Half Day Evening (6-10)

Weekends Full Day (10-4)

Instructor-Led

Hands-On Training

Delivery Options:

In CLS Classroom.

On site Classroom.

Online Live.

Your Training Comes with

a 100% Satisfaction

Guarantee!

EC-Council’s CHFI certifies individuals in the specific security discipline ofcomputer forensics from a vendor-neutral perspective. The CHFIcertification will fortify the application knowledge of law enforcementpersonnel, system administrators, security officers, defense and militarypersonnel, legal professionals, bankers, security professionals, and anyonewho is concerned about the integrity of the network infrastructure.<p><strong>Target Audience <ul> <li>Police and other law enforcementpersonnel, Defense and Military personnel, E-Business Security professionals,Legal professionals, Banking, Insurance and Government agencies.

Course Included:1- CEH Ethical Hacker 40 Hours2- CHFI Forensic Investigator 40 Hours

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348

Page 4: Computer Hacking Forensic Investigator...EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The

Learning Path Outline

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348

CEH Ethical Hacker 40 Hours

Module 01: Introduction to Ethical Hacking

Module 02: Foot printing and ReconnaissanceModule 03: Scanning NetworksModule 04: EnumerationModule 05: Vulnerability AnalysisModule 06: System Hackin

Module 07: Malware ThreatsModule 08: SniffingModule 09: Social EngineeringModule 10: Denial-of-ServiceModule 11: Session HijackingModule 12: Evading IDS, Firewalls,

and HoneypotsModule 13: Hacking Web ServersModule 14: Hacking Web ApplicationsModule 15: SQL InjectionModule 16: Hacking Wireless

NetworksModule 17: Hacking Mobile PlatformsModule 18: IoT Hacking

Module 19: Cloud ComputingModule 20: Cryptography

CHFI Forensic Investigator 40 HoursModule 1. Computer Forensics in Today’s World Module 8. Investigating Web AttacksModule 2. Computer Forensics Investigation ProcessModule 3. Understanding Hard Disks and File SystemsModule 4. Data Acquisition and DuplicationModule 5. Defeating Anti-Forensics TechniquesModule 6. Operating System ForensicsModule 7. Network ForensicsModule 8. Investigating Web AttacksModule 9. Database ForensicsModule 10. Cloud ForensicsModule 11. Malware ForensicsModule 12. Investigating Email Crimes

Module 13. Mobile ForensicsModule 14. Forensics Report Writing and Presentation

Page 5: Computer Hacking Forensic Investigator...EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The

Learning Path Outcome Audience Profile

* Key issues plaguing the information security world, incident

management process, and

* penetration testing.

* Various types of foot printing, foot printing tools, and

countermeasures.

* Network scanning techniques and scanning countermeasures.

* Enumeration techniques and enumeration countermeasures.

* System hacking methodology, steganography, steganalysis

attacks, and covering tracks.

* Different types of Trojans, Trojan analysis, and Trojan

countermeasures.

* Perform incident response and forensics

* Perform electronic evidence collections

* Perform digital forensic acquisitions

* Perform bit-stream Imaging/acquiring of the digital media seized

during the process of investigation.

* Examine and analyze text, graphics, multimedia, and digital

images

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.- Police and other law enforcement personnel- Defense and Military personnel- e-Business Security professionals- Systems administrators- Legal professionals

Prerequisites

No – Prerequisites

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348

Page 6: Computer Hacking Forensic Investigator...EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The

We select the best instructors, who are certified from trustworthy

international vendors. They don’t only provide training program, but they

also share their professional experience with the students, so they can have

hands-on experience on the job market.

CLS facilities are well-equipped with strong hardware and software

technologies that aid both students and trainers lead very effective

smooth training programs.

We provide our clients with the best solutions, Our team of training advisers

answer whatever questions you have.

We have been in the market since 1995, and we kept accumulating

experience in the training business, and providing training for more than

100,000 trainees ever since, in Egypt, and the MENA region.

CLS is an authorized and accredited partner by technology leaders like

Microsoft, EC-Council, Adobe and Autodesk. This means that our

training programs are of the highest quality source materials, the most

up-to-date, and have the highest return on investment ever possible.

We keep tabs on every change in the market and the technology field,

so our training programs will always be updated up to the World-class

latest standards, and adapted to the global shape-shifting job market.

Our clients prefer our training programs not only for the quality

education they get, but also because they are cost effective.

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348


Recommended