Become a Computer Hacking Forensics Investigator!
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.
This course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?"
Who Should Attend?
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers
During this five-day course you’ll learn:
Computer Forensics in Today’s World
Law and Computer Forensics
Computer Investigation Process
First Responder Procedure
Computer Forensic Lab
Understanding File Systems and Hard Disks
Understanding Digital Media Devices
Windows, Linux and Macintosh Boot Processes
Data Acquisition and Duplication
Computer Forensic Tools
Hardware Forensics Tools
Forensics Investigations Using Encase
Recovering Deleted Files and Deleted partitions
Image Files Forensics
Application Password Crackers
Network Forensics and Investigating Logs
Investigating Network Traffic
Investigating Wireless Attacks
Investigating Web Attacks
Investigating DoS Attacks
Investigating Internet Crimes
Tracking E-mails and Investigating E-mail Crimes
Investigating Corporate Espionage
Investigating Trademark and Copyright Infringement
Investigating sexually harassment incidents
Investigating Child Pornography
Becoming an Expert Witness
Why Computer Hacking Forensics
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.
Ready to Register?
Simply Click on the registration button and visit the iClass Partner ATC page!
Academy of Computer Education is an official EC-Council | iClass Partner. Academy of Computer Education offers official EC-Council courses in both thier ground facilities as well as in partnership with EC-Council's iClass solution. This schedule is provided by EC-Council as a benefit to Academy of Computer Education.
EC-Council claims no responsibility for these classes, all contact regarding "Ground" category events should be directed to official contact information located on the Academy of Computer Education official website.
About the Academy of Computer Education
Advanced Security by Academy of Computer Education, the EC-Council 2010 ATC of the Year Award recipient, takes IT security training to a whole new level. We offer security training that is taught by the best minds in the industry. Our instructors are real world professionals and have logged years of experience on the cyber battle fields. We offer varying degrees of hacking and forensics classes from the CEH up to the ECSA/LPT. We provide this training at our two locations (Maryland and Virginia) as well as at our client’s sites around the world.