CHFI | Computer Hacking Forensic Investigator
EC-Council's C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. This includes establishing the forensics process, lab and evidence handling procedures, as well as the investigation procedures required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.
This intense hands-on digital forensics program immerses students in over 68 forensic labs, enabling them to work on crafted evidence files and utilize the tools employed by the world's top digital forensics professionals. Students will go beyond traditional hardware and memory forensics and learn current topics such as cloud forensics, mobile and IoT, investigating web application attacks, and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
Students learn how to acquire and manage evidence through various operating environments, as well as the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court. This knowledge will help them prosecute cybercriminals and limit liability for target organizations.
The program provides credible professional knowledge with a globally recognized certification required for successful digital forensics and DFIR careers, thus increasing your employability.
What Will You Learn
- Computer forensics fundamentals, different types of cybercrimes and their investigation procedures, and regulations and standards that influence computer forensics investigation.
- Various phases involved in the computer forensics investigation process.
- Different types of disk drives and their characteristics, booting process and file systems in Windows, Linux, and Mac operating systems, file system examination tools, RAID and NAS/SAN storage systems, various encoding standards, and file format analysis.
- Data acquisition fundamentals and methodology, eDiscovery, and how to prepare image files for forensics examination.
- Various anti-forensics techniques used by attackers, different ways to detect them and related tools, and countermeasures.
- Volatile and non-volatile data acquisition in Windows-based operating systems, Windows memory and registry analysis, electron application analysis, web browser forensics, and examination of Windows files, ShellBags, LNK files, jump lists, and Windows event logs.
- Volatile and non-volatile data acquisition and memory forensics in Linux and Mac operating systems.
- Different types of IoT threats, security problems, vulnerabilities and attack surfaces areas, and IoT forensics processes and challenges.
Course Outline
- Module 1: Computer Forensics in Today's World
- Module 2: Computer Forensics Investigation Process.
- Module 3: Understanding Hard Disks and File Systems
- Module 4: Data Acquisition and Duplication
- Module 5: Defeating Anti-Forensics Techniques
- Module 6: Windows Forensics
- Module 7: Linux and Mac Forensics
- Module 8: Network Forensics
- Module 9: Malware Forensics
- Module 10: Investigating Web Attacks
- Module 11: Dark Web Forensics
- Module 12: Cloud Forensics
- Module 13: Email and Social Media Forensics
- Module 14: Mobile Forensics
- Module 15: IoT Forensics
Descargue el temario para conocer el detalle completo de los contenidos
Debido a las constantes actualizaciones de los contenidos de los cursos por parte del fabricante, el contenido de este temario puede variar con respecto al publicado en el sitio oficial, sin embargo, Netec siempre entregará la versión actualizada de éste
CHFI | Computer Hacking Forensic Investigator
Duración Virtual en vivo: 5 días
Digital: 12 meses
Versión 11 Temario Descarga aquí ⇩ Métodos de entrega 👤 💻 @