CHFI presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
Learning Objectives
- Module 1: Computer Forensics in Today’s World
- Module 2: Law and Computer Forensics
- Module 3: Computer Investigation Process
- Module 4: First Responder Procedure
- Module 5: CSIRT
- Module 6: Computer Forensic Lab
- Module 7: Understanding File Systems and Hard Disks
- Module 8: Understanding Digital Media Devices
- Module 9: Windows, Linux and Macintosh Boot Processes
- Module 10: Windows Forensics
- Module 11: Linux Forensics
- Module 12: Data Acquisition and Duplication
- Module 13: Computer Forensic Tools
- Module 14: Forensics Investigations Using Encase
- Module 15: Recovering Deleted Files and Deleted partitions
- Module 16: Image Files Forensics
- Module 17: Steganography
- Module 18: Application Password Crackers
- Module 19: Network Forensics and Investigating Logs
- Module 20: Investigating Network Traffic
- Module 21: Investigating Wireless Attacks
- Module 22: Investigating Web Attacks
- Module 23: Router Forensics
- Module 24: Investigating DoS Attacks
- Module 25: Investigating Internet Crimes
- Module 26: Tracking E-mails and Investigating E-mail Crimes
- Module 27: Investigating Corporate Espionage
- Module 28: Investigating Trademark and Copyright Infringement
- Module 29: Investigating Sexual Harassment Incidents
- Module 30: Investigating Child Pornography
- Module 31: PDA Forensics
- Module 32: iPod Forensics
- Module 33: Blackberry Forensics
- Module 35: Investigative Reports
- Module 36: Becoming an Expert Witness