This training covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.
5 Days
- IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response Â
- Prior completion of CEH training would be an advantageÂ
- Information Security Analyst/Administrator
- Information Systems Security Engineer/Manager
- Information Security Professionals/Officers
- Information Security/IT Auditors
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
What you will learn:Â
- Perform incident response and forensicsÂ
- Perform electronic evidence collectionsÂ
- Perform digital forensic acquisitionsÂ
- Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.Â
- Examine and analyze text, graphics, multimedia, and digital imagesÂ
- Conduct thorough examinations of computer hard disk drives, and other electronic data storage mediaÂ
- Recover information and electronic data from computer hard drives and other data storage devicesÂ
- Follow strict data and evidence handling proceduresÂ
- Maintain audit trail (i.e., chain of custody) and evidence integrityÂ
- Work on technical examination, analysis and reporting of computer-based evidenceÂ
- Prepare and maintain case filesÂ
- Utilize forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other filesÂ
- Gather volatile and non-volatile information from Windows, MAC and LinuxÂ
- Recover deleted files and partitions in Windows, Mac OS X, and LinuxÂ
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurredÂ
- Apply advanced forensic tools and techniques for attack reconstructionÂ
- Perform fundamental forensic activities and form a base for advanced forensicsÂ
- Identify and check the possible source/incident originÂ
- Perform event co-relationÂ
- Computer Forensics in Today’s WorldÂ
- Computer Forensics Investigation ProcessÂ
- Understanding Hard Disks and File SystemsÂ
- Operating System ForensicsÂ
- Defeating Anti-Forensics TechniquesÂ
- Data Acquisition and DuplicationÂ
- Network ForensicsÂ
- Investigating Web AttacksÂ
- Database ForensicsÂ
- Cloud ForensicsÂ
- Malware ForensicsÂ
- Investigating Email CrimesÂ
- Mobile ForensicsÂ
- Investigative ReportsÂ
This course prepares you for the following certification:Â
- Computer Hacking Forensic InvestigatorÂ