Computer Hacking Forensic Investigator _CHFI Computer Hacker by mifei

VIEWS: 49 PAGES: 2

									Computer Hacking Forensic Investigator
The Computer Hacking Forensics Investigator (CHFI) course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware, and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into almost every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

Key Data
Course #:
Number of Days: Format: Certification Exams: Certification Track:

CHFI
5 Instructor-Led 312-49 CHFI

This class will immerse the student into an interactive environment where they will learn the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.

Audience
The CHFI certification will fortify the application knowledge of Police and other law enforcement personnel, Defense and Military personnel, E-business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, and IT managers.

Course Objectives
• • Learn about Law and Computer Forensics in today’s world Learn how the Computer Investigation Process and Security Incident Response Team work • • • • • • • • • • • • Computer Forensic Laboratory Requirements Understanding file systems and hard disks Windows Forensics Linux and Macintosh boot processes Linux Forensics Data acquisition and duplication Recovering deleted files Image Files Forensics Steganography Computer Forensic Tools Application password crackers Investigating Logs and network traffic Router Forensics Investigating web attacks and email crimes, tracking email Mobile and PDA Forensics Investigating trademark and copyright infringement Investigative reports and becoming an expert witness Forensics in action.

Hilton Computer Strategies
6001 Savoy Suite 207 Houston, TX 77036 713.782.6665 800.324.7415 713.782.0630 fax
www.hiltoncomputer.com

• • • • • •

Prerequisites
A CHFI candidate should have experience with Windows and/or UNIX/LINUX operating systems, and knowledge of TCP/IP and networking. CEH certification is strongly recommended.

Student Materials
The student kit includes a comprehensive workbook and other necessary materials for this class.

#CHFI Computer Hacker Forensic Investigator

Course Outline Day 1
Module I computer Forensics in Today’s World Module II: Law And Computer Forensics Module III: Computer Investigation Process Module IV: Computer Security Incident Response Team Module V: Computer Forensic Laboratory Requirements

Day 2 Module VI: Understanding File systems and Hard disks Module VII: Windows Forensics Module VIII: Linux and Macintosh Boot processes Module IX: Linux Forensics Module XX: Data Acquisition and Duplication Day 3 Module XI: Recovering Deleted Files Module XII: Image Files Forensics Module XIII: Steganography Module XIV: Computer Forensic Tools Module XV: Application password crackers Day 4 Module XVI: Investigating Logs Module XVII: Investigating network traffic Module XVIII: Router Forensics Module XIX: Investigating Web Attacks Module XX: Tracking E-mails and Investigating Email crimes Day 5 Module XXI: Mobile and PDA Forensics Module XXII: Investigating Trademark and Copyright Infringement Module XXIII: Investigative Reports Module XIV: Becoming an Expert Witness Module XXV: Forensics in action

www.hiltoncomputer.com Hilton Computer Strategies 713.782.6665 / 800.324.7415


								
To top