As an EC-Council authorized training provider, this official Computer Hacking Forensic Investigator course covers the material required to prepare an individual for the Computer Hacking Forensic Investigator exam. Students learn a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
Learning Objectives
- Introduction to Computer Forensics
- Computer Forensics Investigation Process
- Searching and Seizing Computers
- Digital Evidence
- First Responder Procedures
- Computer Forensics Lab
- Understanding Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Deleted Partitions
- Forensics Investigation using AccessData FTK
- Forensics Investigation Using EnCase
- Steganography and Image File Forensics
- Application Password Crackers
- Log Capturing and Event Correlation
- Network Forensics
- Investigating Logs and Investigating Network Traffic
- Investigating Wireless Attacks and Web Attacks
- Tracking Emails and Investigating Email Crimes
- Mobile Forensics
- Investigative Reports
- Becoming an Expert Witnes
Framework Connections
Specialty Areas
- Cyber Defense Analysis
- Cyber Operations
- Digital Forensics
- Incident Response
- Legal Advice and Advocacy
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.