As an EC-Council authorized training provider, this official Computer Hacking Forensic Investigator course covers the material required to prepare an individual for the Computer Hacking Forensic Investigator exam. Students learn a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
Learning Objectives
- Introduction to Computer Forensics
- Computer Forensics Investigation Process
- Searching and Seizing Computers
- Digital Evidence
- First Responder Procedures
- Computer Forensics Lab
- Understanding Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Deleted Partitions
- Forensics Investigation using Access Data FTK
- Forensics Investigation Using EnCase
- Steganography and Image File Forensics
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics
- Investigating Logs and Investigating Network Traffic
- Investigating Wireless Attacks and Web Attacks
- Tracking Emails and Investigating Email Crimes
- Mobile Forensics
- Investigative Reports
- Becoming an Expert Witness
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):