• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

EC-Council released the most advanced computer forensic investigation program in the world. This course covers major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Students will learn how to excel in digital evidence acquisition, handling, and forensically sound analysis. These skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats, and other intricate cases involving computer systems.

Learning Objectives

  • Module 01: Introduction to Ethical Hacking.
  • Module 02: Footprinting and Reconnaissance.
  • Module 03: Scanning Networks.
  • Module 04: Enumeration.
  • Module 05: Vulnerability Analysis.
  • Module 06: System Hacking.
  • Module 07: Malware Threats.
  • Module 08: Sniffing.
  • Module 09: Social Engineering.
  • Module 10: Denial-of-Service.
  • Module 11: Session Hijacking.
  • Module 12: Evading IDS, Firewalls, and Honeypots.
  • Module 13: Hacking Web Servers.
  • Module 14: Hacking Web Applications.
  • Module 15: SQL Injection.
  • Module 16: Hacking Wireless Networks.
  • Module 17: Hacking Mobile Platforms.
  • Module 18: IoT Hacking.
  • Module 19: Cloud Computing.
  • Module 20: Cryptography.
  • Framework Connections

    The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

    Feedback

    If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.