This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and
practical experience with the current essential security systems.
Computer Forensics in Today s World
Computer Forensics Investigation Process
Searching & Seizing of computers
First responder Procedures
Computer Forensics Lab
Understanding Hard disks & File Systems
Digital Media Devices
Windows Linux Macintosh Boot Process
Windows Forensics I
You are an ethical hacker. Your last name is “Pwned.” You dream about enumeration and you can scan networks in your sleep. You have expert knowledge and an arsenal of hacking tools. You know how to successfully attack fully patched and hardened systems and circumvent common security controls.
The Licensed Penetration Tester exam is the capstone that encapsulates the entire information security track of EC-Council. While the Certified Ethical Hacker course teaches an individual what are the threat agents that can compromise the security posture of an organization and the EC-Council Security Analyst program provides a repeatable and documentable methodology that can be used by a security auditor while analyzing the security status of the organization, the Licensed Penetration Tester exam covers a completely different skill-set that is needed by every penetration tester – Report Writing.