This track is designed to teach you the skills you will need to become a professional Computer Forensics Investigator in one year!
This track begins with the Certified Network Defender to get you started with a strong network security foundation. From there, you will take the Ethical Hacker Core Skills where you will learn to examine network traffic at the binary level, master the TCP/IP protocol, as well as essential UNIX and Linux survival skills. Additionally, you will be introduced to vulnerability assessments and hacking methodology.
Once you have a solid foundation, you will be ready to move into the realm of ethical hacking and threat hunting with the Certified Ethical Hacker (CEH) course. Learning how hackers break into networks is key to incident handling and response. So, once you have mastered the 5 Phases of Ethical Hacking you will be ready to learn how to detect, validate, contain, and eradicate security incidents.
The capstone of this track is the Computer Hacking Forensic Investigator (CHFI) course which covers major forensic investigation scenarios and enables students to acquire the necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation. CHFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.