(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 128 - Computer Hacking Forensics Investigator (CHFI) V9.0
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 128 | 14 October 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 128 | 11 November 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 128 | 09 December 2024 | 5 Days | Istanbul | Registration Form Link |
Course Description
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally. Computer Security and Computer Investigations are changing terms. More tools are invented daily for conducting Computer Investigations. Be it computer crime, digital forensics, computer investigations, or even standard computer data recovery, the tools and techniques covered in this program will prepare the participants to conduct computer investigations using groundbreaking digital forensics technologies.
Course Objectives
- Understanding computer forensics investigation process
- Setting up workstation for computer forensics
- Investigating various types of attacks
- Learning how to recover deleted files
- Becoming a witness in cyber crimes
Who Should Attend?
- Police and other laws enforcement personnel
- Defense and military personnel
- E-Business security professionals
- Systems administrators
- Legal professionals
Course Details/Schedule
Day 1
- Computer forensics and investigations as a profession
- Understanding computer investigations
- Working with windows and dos systems
- Macintosh and Linux boot processes and disk structures
- The investigators office and laboratory
Day 2
- Current computer forensics tools
- Digital evidence controls
- Processing crime and incident scenes
- Data acquisition
- Computer forensic analysis
- E-mail investigations
- Recovering image files
Day 3
- Writing investigation reports
- Becoming an expert witness
- Computer security incident response team
- Logfile analysis
- Recovering deleted files
- Application password crackers
Day 4
- Investigating e-mail crimes
- Investigating web attacks
- Investigating network traffic
- Investigating router attacks
Day 5
- The computer forensics process
- Data duplication
- Windows forensics
- Linux forensics
- Enforcement law and prosecution
- Investigating trademark and copyright infringement