Monday, 18 March 2013

Content of Computer Hacking Forensics Investigator || Mukesh


The CHFI program is designed for all IT professionals involved with information system security, computer

forensics, and incident response.

Course Content

Module 1 - Computer Forensics in Today¡¦s World
Module 2 - Computer Forensics Investigation Process
Module 3 - Searching and Seizing Computers
Module 4 - Digital Evidence
Module 5 - First Responder Procedures
Module 6 - Computer Forensics Lab
Module 7 - Understanding Hard Disks and File Systems
Module 8 - Windows Forensics
Module 9.- Data Acquisition and Duplication
Module 10 - Recovering Deleted Files and Deleted Partitions
Module 11- Forensics Investigation Using AccessData FTK
Module 12- Forensics Investigation Using EnCase
Module 13 - Steganography and Image File Forensics
Module 14 - Application Password Crackers
Module 15 - Log Capturing and Event Correlation
Module 16 - Network Forensics, Investigating Logs and
Investigating Network Traffic
Module 17 - Investigating Wireless Attacks
Module 18 - Investigating Web Attacks
Module 19 - Tracking Emails and Investigating Email Crimes
Module 20 - Mobile Forensics
Module 21 - Investigative Reports
Module 22 - Becoming an Expert Witness
Associated Certifications & Exam
C|HFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective.
The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security
officers, defence and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about
the integrity of the network infrastructure.
This course prepares you for the CHFI 312-49 exam.
On successful completion of this course students will receive a Torque IT attendance certificate.