Computer Hacking Forensic
Investigator
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348
Learning Path Overview
Computer Hacking Forensic Investigator Duration:80 Hours
Schedule :Full Day Morning ( 9-5)
Half Day Evening (6-10)
Weekends Full Day (10-4)
Instructor-Led
Hands-On Training
Delivery Options:
In CLS Classroom.
On site Classroom.
Online Live.
Your Training Comes with
a 100% Satisfaction
Guarantee!
EC-Council’s CHFI certifies individuals in the specific security discipline ofcomputer forensics from a vendor-neutral perspective. The CHFIcertification will fortify the application knowledge of law enforcementpersonnel, system administrators, security officers, defense and militarypersonnel, legal professionals, bankers, security professionals, and anyonewho is concerned about the integrity of the network infrastructure.<p><strong>Target Audience <ul> <li>Police and other law enforcementpersonnel, Defense and Military personnel, E-Business Security professionals,Legal professionals, Banking, Insurance and Government agencies.
Course Included:1- CEH Ethical Hacker 40 Hours2- CHFI Forensic Investigator 40 Hours
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348
Learning Path Outline
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348
CEH Ethical Hacker 40 Hours
Module 01: Introduction to Ethical Hacking
Module 02: Foot printing and ReconnaissanceModule 03: Scanning NetworksModule 04: EnumerationModule 05: Vulnerability AnalysisModule 06: System Hackin
Module 07: Malware ThreatsModule 08: SniffingModule 09: Social EngineeringModule 10: Denial-of-ServiceModule 11: Session HijackingModule 12: Evading IDS, Firewalls,
and HoneypotsModule 13: Hacking Web ServersModule 14: Hacking Web ApplicationsModule 15: SQL InjectionModule 16: Hacking Wireless
NetworksModule 17: Hacking Mobile PlatformsModule 18: IoT Hacking
Module 19: Cloud ComputingModule 20: Cryptography
CHFI Forensic Investigator 40 HoursModule 1. Computer Forensics in Today’s World Module 8. Investigating Web AttacksModule 2. Computer Forensics Investigation ProcessModule 3. Understanding Hard Disks and File SystemsModule 4. Data Acquisition and DuplicationModule 5. Defeating Anti-Forensics TechniquesModule 6. Operating System ForensicsModule 7. Network ForensicsModule 8. Investigating Web AttacksModule 9. Database ForensicsModule 10. Cloud ForensicsModule 11. Malware ForensicsModule 12. Investigating Email Crimes
Module 13. Mobile ForensicsModule 14. Forensics Report Writing and Presentation
Learning Path Outcome Audience Profile
* Key issues plaguing the information security world, incident
management process, and
* penetration testing.
* Various types of foot printing, foot printing tools, and
countermeasures.
* Network scanning techniques and scanning countermeasures.
* Enumeration techniques and enumeration countermeasures.
* System hacking methodology, steganography, steganalysis
attacks, and covering tracks.
* Different types of Trojans, Trojan analysis, and Trojan
countermeasures.
* Perform incident response and forensics
* Perform electronic evidence collections
* Perform digital forensic acquisitions
* Perform bit-stream Imaging/acquiring of the digital media seized
during the process of investigation.
* Examine and analyze text, graphics, multimedia, and digital
images
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.- Police and other law enforcement personnel- Defense and Military personnel- e-Business Security professionals- Systems administrators- Legal professionals
Prerequisites
No – Prerequisites
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348
We select the best instructors, who are certified from trustworthy
international vendors. They don’t only provide training program, but they
also share their professional experience with the students, so they can have
hands-on experience on the job market.
CLS facilities are well-equipped with strong hardware and software
technologies that aid both students and trainers lead very effective
smooth training programs.
We provide our clients with the best solutions, Our team of training advisers
answer whatever questions you have.
We have been in the market since 1995, and we kept accumulating
experience in the training business, and providing training for more than
100,000 trainees ever since, in Egypt, and the MENA region.
CLS is an authorized and accredited partner by technology leaders like
Microsoft, EC-Council, Adobe and Autodesk. This means that our
training programs are of the highest quality source materials, the most
up-to-date, and have the highest return on investment ever possible.
We keep tabs on every change in the market and the technology field,
so our training programs will always be updated up to the World-class
latest standards, and adapted to the global shape-shifting job market.
Our clients prefer our training programs not only for the quality
education they get, but also because they are cost effective.
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348