+ All Categories
Home > Documents > Every crime leaves a trail of evidence - Iverson · Computer Hacking Forensic Investigator...

Every crime leaves a trail of evidence - Iverson · Computer Hacking Forensic Investigator...

Date post: 20-Jul-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
1
Centre of Excellence Operated by Iverson Associates Sdn Bhd (303330-M) Tel : +603 7726 2678 Fax : +603 7727 9737 E-mail : [email protected] Website : www.iverson.com.my For further information or registration, please contact us at: Copyright © 2017 EC-Council Centre of Excellence, operated by Iverson Associates Sdn Bhd. All Rights Reserved. About the Exam Number of Questions: 150 Test Duration: 4 Hours Test Format: Multiple Choice Test Delivery: ECC EXAM, VUE Free 1-Day Vulnerability Assessment Specialized Training FOR EACH PARTICIPANT The CHFI program is designed for all IT profession- als involved with information system security, computer forensics, and incident response. Who Should Attend? Next Class: 5-9 June 2017 CHFI iLabs (subscription based) – Students now can dynamically access a host of Virtual Machines preconfigured with forensics tools and evidence file from anywhere with an internet connection. This is a cloud based subscription service from EC-Council designed to deliver serious hands on practice for the information security professional. The cloud portal enables a course participant to launch an entire range of victim machines and access them remotely with just a few clicks. It is the most cost effective, easy to use, live range lab solution available globally today. Evidence file - Meant for students to practice forensic investigation tools presented in the lab manual. Students will use these files to simulate real world forensic investigation. Forensics Challenges - Given at the end of lab manual as an exercise for the students to try out by examining the respective forensic challenge file provided in DVD and come up with the evidence found in it. Sample results for the forensic challenge are also provided in the lab manual. Key Features in CHFI Computer Hacking Forensic Investigator EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFI presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems. C HFI Computer Hacking Forensic INVESTIGATOR TM Every crime leaves a trail of evidence Trace ∙ Investigate ∙ Apprehend
Transcript
Page 1: Every crime leaves a trail of evidence - Iverson · Computer Hacking Forensic Investigator EC-Council releases the most advanced Computer Forensic Investigation program in the world.

Centre of Excellence

Operated by

Iverson Associates Sdn Bhd (303330-M)

Tel : +603 7726 2678Fax : +603 7727 9737E-mail : [email protected] : www.iverson.com.my

For further information or registration, please contact us at:

Copyright © 2017 EC-Council Centre of Excellence, operated by Iverson Associates Sdn Bhd. All Rights Reserved.

About the Exam• Number of Questions: 150• Test Duration: 4 Hours• Test Format: Multiple Choice• Test Delivery: ECC EXAM, VUE

Free 1-Day Vulnerability Assessment

Specialized TrainingFOR EACH PARTICIPANT

The CHFI program is designed for all IT profession-als involved with information system security,computer forensics, and incident response.

Who Should Attend?

Next Class: 5-9 June 2017

CHFI iLabs (subscription based) – Students now can dynamically access a host of Virtual Machines preconfigured with forensics tools and evidence file from anywhere with an internet connection.This is a cloud based subscription service from EC-Council designed to deliver serious hands on practice for the information security professional.The cloud portal enables a course participant to launch an entire range of victim machines and access them remotely with just a few clicks. It is the most cost effective, easy to use, live range lab solution available globally today.Evidence file - Meant for students to practice forensic investigation tools presented in the lab manual.Students will use these files to simulate real world forensic investigation.Forensics Challenges - Given at the end of lab manual as an exercise for the students to try out by examining the respective forensic challenge file provided in DVD and come up with the evidence found in it.Sample results for the forensic challenge are also provided in the lab manual.

Key Features in CHFI•

•••

Computer Hacking Forensic Investigator EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFI presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you.

This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

C HFIComputer

Hacking Forensic INVESTIGATOR

TM

Every crime leaves a trail of evidence

Trace ∙ Investigate ∙ Apprehend

Recommended