CHFI

  • ETHICAL HACKING

  • Duration : 40H

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute.

Modules


  • Computer Forensics in Today s World
  • Computer Forensics Investigation Process
  • Searching & Seizing of computers
  • Digital Evidence
  • First responder Procedures
  • Incident Handling
  • Computer Forensics Lab
  • Understanding Hard disks & File Systems
  • Digital Media Devices
  • CD/DVD Forensics
  • Windows Linux Macintosh Boot Process
  • Windows Forensics I
  • Windows Forensics II
  • Hacking Forensics
  • Mac Forensics
  • Data Acquisition & Duplication
  • Recovering Deleted Files & Deleted partitions
  • Forensics Investigations Using Access Data FTK
  • Forensics Investigations Using Encase
  • Steganography
  • Image Files Forensics
  • Audio File Forensics
  • Video File Forensics
  • Application password Crackers
  • Log Capturing & Event Correlation
  • Network Forensics & Investigation Logs
  • Investigating Network Traffic
  • Router Forensics
  • Investigating Wireless Attacksv
  • Investigating Web Attacks
  • Investigating DoS Attacks
  • Investigating Virus, Trojan, Spyware & Root kit Attacks
  • Investigating Internet Crimes
  • Tracing E Mails & Investigating E Mail Crimes
  • PDA Forensics
  • Blackberry Forensics
  • I Pod & I Phone Forensics
  • Cell Phone Forensics
  • USB Forensics
  • Printer Forensics
  • Investigating Corporate Espionage
  • Investigating Computer Data Breachesv
  • Investigating Trademark & Copyright Infringement
  • Investigating Sexual Harassment Incidents
  • Investigating Child Pornography Cases
  • Investigating Identity Theft Cases
  • Investigating Defamation over Websites & Blog Postings
  • Investigating Social Networking Websites for Evidences
  • Investigating Search Keywords
  • Investigative Reports
  • Becoming an Expert Witness
  • How to Become a Digital detective
  • Computer Forensics for lawyers
  • Law & Computer Forensics
  • Computer Forensics & Legal Compliance
  • Security Policies
  • Risk Assessment
  • Evaluation & Certificate of Information Systems
  • Ethics in Computer Forensics
  • Computer Forensic Tools
  • Windows Based Command line tools
  • Windows based GUI Tools
  • Forensics Frameworks
  • Forensics Investigation Templates
  • Computer Forensics Consulting Companies