CHFI
Duration : 40hrs
ETHICAL HACKING
The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute.
Modules
- Computer Forensics in Today s World
- Computer Forensics Investigation Process
- Searching & Seizing of computers
- Digital Evidence
- First responder Procedures
- Incident Handling
- Computer Forensics Lab
- Understanding Hard disks & File Systems
- Digital Media Devices
- CD/DVD Forensics
- Windows Linux Macintosh Boot Process
- Windows Forensics I
- Windows Forensics II
- Hacking Forensics
- Mac Forensics
- Data Acquisition & Duplication
- Recovering Deleted Files & Deleted partitions
- Forensics Investigations Using Access Data FTK
- Forensics Investigations Using Encase
- Steganography
- Image Files Forensics
- Audio File Forensics
- Video File Forensics
- Application password Crackers
- Log Capturing & Event Correlation
- Network Forensics & Investigation Logs
- Investigating Network Traffic
- Router Forensics
- Investigating Wireless Attacksv
- Investigating Web Attacks
- Investigating DoS Attacks
- Investigating Virus, Trojan, Spyware & Root kit Attacks
- Investigating Internet Crimes
- Tracing E Mails & Investigating E Mail Crimes
- PDA Forensics
- Blackberry Forensics
- I Pod & I Phone Forensics
- Cell Phone Forensics
- USB Forensics
- Printer Forensics
- Investigating Corporate Espionage
- Investigating Computer Data Breachesv
- Investigating Trademark & Copyright Infringement
- Investigating Sexual Harassment Incidents
- Investigating Child Pornography Cases
- Investigating Identity Theft Cases
- Investigating Defamation over Websites & Blog Postings
- Investigating Social Networking Websites for Evidences
- Investigating Search Keywords
- Investigative Reports
- Becoming an Expert Witness
- How to Become a Digital detective
- Computer Forensics for lawyers
- Law & Computer Forensics
- Computer Forensics & Legal Compliance
- Security Policies
- Risk Assessment
- Evaluation & Certificate of Information Systems
- Ethics in Computer Forensics
- Computer Forensic Tools
- Windows Based Command line tools
- Windows based GUI Tools
- Forensics Frameworks
- Forensics Investigation Templates
- Computer Forensics Consulting Companies
Call Us Now & Make your dream True