Become a Computer Hacking Forensics Investigator!
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.
This course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?"
Who Should Attend?
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers
During this five-day course you’ll learn:
Computer Forensics in Today’s World
Law and Computer Forensics
Computer Investigation Process
First Responder Procedure
Computer Forensic Lab
Understanding File Systems and Hard Disks
Understanding Digital Media Devices
Windows, Linux and Macintosh Boot Processes
Data Acquisition and Duplication
Computer Forensic Tools
Hardware Forensics Tools
Forensics Investigations Using Encase
Recovering Deleted Files and Deleted partitions
Image Files Forensics
Application Password Crackers
Network Forensics and Investigating Logs
Investigating Network Traffic
Investigating Wireless Attacks
Investigating Web Attacks
Investigating DoS Attacks
Investigating Internet Crimes
Tracking E-mails and Investigating E-mail Crimes
Investigating Corporate Espionage
Investigating Trademark and Copyright Infringement
Investigating sexually harassment incidents
Investigating Child Pornography
Becoming an Expert Witness
Why Computer Hacking Forensics
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.
Ready to Register?
Simply Click on the registration button and you will be redirected to the CHFI info page. Fill out the form at the bottom of that page and you will contacted within 24 hours! Thanks so much!
EC-Council | iClass Online Event Venue is a robust learning environment designed to enhance the remote learning experience of our Information Security Students. iClass encompasses current technologies in online Web Conferencing, VOIP Services, and distributed Video Platforms! By combining live instruction, classroom interactivity, remote control capabilities, live hands-on labs where applicable, and the power of the world wide web, students now have more learning options than ever when it comes to EC-Council titles.
Ready to Register?
If you are looking for self paced, online training click HERE!