TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 128 - Computer Hacking Forensics Investigator (CHFI) V9.0

Code Start Date Duration Venue
IT-S 128 01 April 2024 5 Days Istanbul Registration Form Link
IT-S 128 27 May 2024 5 Days Istanbul Registration Form Link
IT-S 128 24 June 2024 5 Days Istanbul Registration Form Link
IT-S 128 22 July 2024 5 Days Istanbul Registration Form Link
IT-S 128 19 August 2024 5 Days Istanbul Registration Form Link
IT-S 128 16 September 2024 5 Days Istanbul Registration Form Link
IT-S 128 14 October 2024 5 Days Istanbul Registration Form Link
IT-S 128 11 November 2024 5 Days Istanbul Registration Form Link
IT-S 128 09 December 2024 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally. Computer Security and Computer Investigations are changing terms. More tools are invented daily for conducting Computer Investigations. Be it computer crime, digital forensics, computer investigations, or even standard computer data recovery, the tools and techniques covered in this program will prepare the participants to conduct computer investigations using groundbreaking digital forensics technologies.

Course Objectives

  • Understanding computer forensics investigation process
  • Setting up workstation for computer forensics
  • Investigating various types of attacks
  • Learning how to recover deleted files 
  • Becoming a witness in cyber crimes 

Who Should Attend?

  • Police and other laws enforcement personnel
  • Defense and military personnel
  • E-Business security professionals
  • Systems administrators
  • Legal professionals

Course Details/Schedule

Day 1

  • Computer forensics and investigations as a profession
  • Understanding computer investigations
  • Working with windows and dos systems
  • Macintosh and Linux boot processes and disk structures
  • The investigators office and laboratory

Day 2

  • Current computer forensics tools
  • Digital evidence controls
  • Processing crime and incident scenes
  • Data acquisition
  • Computer forensic analysis
  • E-mail investigations
  • Recovering image files

Day 3

  • Writing investigation reports
  • Becoming an expert witness
  • Computer security incident response team
  • Logfile analysis
  • Recovering deleted files
  • Application password crackers

Day 4

  • Investigating e-mail crimes
  • Investigating web attacks
  • Investigating network traffic
  • Investigating router attacks

Day 5

  • The computer forensics process
  • Data duplication
  • Windows forensics
  • Linux forensics
  • Enforcement law and prosecution
  • Investigating trademark and copyright infringement