The CHFI course will give participants the necessary skills to identify an intruder''s footprints and to properly gather the necessary evidence to prosecute.
If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course to attend.
Specific Topics include:
- Laws and Computer Forensics
- Computer Investigation Process
- First Responder Procedure
- CSIRT*Computer Forensic Lab
- Understanding File Systems and Hard Disks
- Understanding Digital Media Devices
- Windows, Linux and Macintosh Boot Processes
- Windows Forensics
- Linux Forensics
- Data Acquisition and Duplication
- Software Forensic Tools
- Hardware Forensics Tools
- Forensics Investigations Using Encase
- Recovering Deleted Files and Deleted partitions
- Image Files Forensics
- Application Password Crackers
- Network Forensics and Investigating Logs
- Investigating Network Traffic
- Investigating Wireless Attacks
- Investigating Web Attacks
- Router Forensics
- Investigating DoS Attacks
- Investigating Internet Crimes
- Tracking E-mails and Investigating E-mail Crimes
- Investigating Corporate Espionage
- Investigating Trademark and Copyright Infringement
- Investigating sexual harassment incidents
- Investigating Child Pornography
- PDA Forensics
- iPod Forensics
- Blackberry Forensics
- Investigative Reports
- Becoming an Expert Witness
Students that will find the most value from this class include Police and other law enforcement personnel, Defense and Military personnel,
e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals,
Government agencies, and IT managers.
The CHFI 312-49 exam will be conducted on the last day of training.
It is strongly recommended that students attend the CEH class before enrolling into CHFI program.