+ All Categories
Home > Documents > SEC875: Computer Hacking Forensic Investigator - CHFI v8 · COURSE OUTLINE SEC875: Computer Hacking...

SEC875: Computer Hacking Forensic Investigator - CHFI v8 · COURSE OUTLINE SEC875: Computer Hacking...

Date post: 18-Jul-2018
Category:
Upload: buicong
View: 223 times
Download: 3 times
Share this document with a friend
2
Audience This course is intended for information security and law enforcement professionals. Students should be in job roles that are directly responsible for information security. PRerequisites Prior to attending this course, students must have completed one of the following courses or cur- » » Course SEC800: Ethical Hacking and Countermeasures v8 (CEH v8) WHAT YOU WILL LEARN » Implement the process of investigating cybercrime, laws involved, and the details in obtaining and executing a search warrant. » rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category. » incidents. This includes building and using the electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence and reporting the crime scene. » Windows, Mac OS X, and Linux. » Recover deleted email, images, documents, » Conduct a forensic investigation using Access Data FTK and Encase. » Identify the use of steganography and its techniques, and conduct steganalysis. » » Use password cracking tools and various types of password attacks to investigate » techniques, log management, time synchronization and log capturing tools. » attacks, and web attacks. SEC875: Computer Hacking Forensic Investigator - CHFI v8 and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. d with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be hacked?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you. CISSP | CEH | PKI | SECURITY + (course outline on back side) Can’t make it to class in person? Attend many classes online with RemoteLive.™ Call 602-266-8585 today for a live demo. ©2016 Interface Technical Training All rights reserved $3395.00 5-day course Includes Authorized CEHv8 Courseware Promo and package discounts may apply Questions? Call 602-266-8585 “Interface is amazing! I’ll back for any future training.” Interface Student Phoenix, AZ
Transcript

AudienceThis course is intended for information security and law enforcement professionals. Students should be in job roles that are directly responsible for information security.

PRerequisitesPrior to attending this course, students must have completed one of the following courses or cur-

» » Course SEC800: Ethical Hacking and Countermeasures v8 (CEH v8)

WHAT YOU WILL LEARN » Implement the process of investigating

cybercrime, laws involved, and the details in obtaining and executing a search warrant.

»rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category.

»incidents. This includes building and using the

electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence and reporting the crime scene.

»Windows, Mac OS X, and Linux.

» Recover deleted email, images, documents,

» Conduct a forensic investigation using Access Data FTK and Encase.

» Identify the use of steganography and its techniques, and conduct steganalysis.

» » Use password cracking tools and various

types of password attacks to investigate

»techniques, log management, time synchronization and log capturing tools.

»attacks, and web attacks.

SEC875: Computer Hacking Forensic Investigator - CHFI v8

and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques.

d with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be hacked?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or

most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

CISSP | CEH | PKI | SECURITY +

(course outline on back side)

Can’t make it to class in person?Attend many classes online with RemoteLive.™

Call 602-266-8585 today for a live demo.©2016 Interface Technical Training All rights reserved

$3395.00• 5-day course• Includes Authorized

CEHv8 Courseware• Promo and package

discounts may apply

Questions?Call 602-266-8585

“Interface is amazing! I’ll

back for any future training.” Interface StudentPhoenix, AZ

COURSE OUTLINE SEC875: Computer Hacking Forensic Investigator - CHFI v8

» Lesson 1: Computer Forensics in Today’s World

» Lesson 2: Computer Forensics Investigation Process

» Lesson 3: Searching and Seizing of Computers

» Lesson 4: Digital Evidence

» Lesson 5: First Responder Procedures

» Lesson 6: Computer Forensics Lab

» Lesson 7: Understanding Hard Disks and File Systems

» Lesson 8: Windows Forensics

» Lesson 9: Data Acquisition and Duplication

» Lesson 10: Recovering Deleted Files and Deleted Partitions

» Lesson 11: Forensics Investigations Using AccessData FTK

» Lesson 12: Forensics Investigations Using Encase

» Lesson 13: Steganography and Image Files Forensics

» Lesson 14: Application Password Crackers

» Lesson 15: Log Capturing and Event Correlation

» Lesson 16: Network Forensics, Investigation Logs and Investigating Network Traffic

» Lesson 17: Investigating Wireless Attacks

» Lesson 18: Investigating Web Attacks

» Lesson 19: Tracking Emails and Investigating Email Crimes

» Lesson 20: Mobile Forensics

» Lesson 21: Investigative Reports

» Lesson 22: Becoming an Expert Witness

Register by phone at 602-266-8585, or online at www.InterfaceTT.com.©2016 Interface Technical Training All rights reserved. v042516


Recommended