- Security Programming and Security Management
- Computer Hacking Forensic Investigator (Official EC-Council)
The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute.
- Course Outline
Course ECCHFIV3: 5 Days; Instructor-led
The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.
Who Should Attend
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers.
The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification.
Module 01: Computer Forensics in Today’s World
· Ways of Forensic Data Collection
· Objectives of Computer Forensics
· Benefits of Forensic Readiness
· Categories of Forensics Data
· Computer Facilitated Crimes
· Type of Computer Crimes
· Examples of Evidence
· Stages of Forensic Investigation in Tracking Cyber Criminals
· Key Steps in Forensics Investigations
· Need for Forensic Investigator
· When An Advocate Contacts The Forensic Investigator, He Specifies How To Approach
· Enterprise Theory of Investigation (ETI)
· Where and when do you use Computer Forensics
· Legal Issues
· Reporting the Results
Module 02: Law and Computer Forensics
· Privacy Issues Involved in Investigations
· Fourth Amendment Definition
· Interpol- Information Technology Crime Center
· Internet Laws and Statutes
· Intellectual Property Rights
· Cyber Stalking
· Crime Investigating Organizations
· The G8 Countries: Principles to Combat High-tech Crime
· The G8 Countries: Action Plan to Combat High-Tech Crime (International Aspects of Computer Crime)
· United Kingdom: Police and Justice Act 2006
· Australia: The Cybercrime Act 2001
· European Laws
· Austrian Laws
· Brazilian Laws
· Belgium Laws
· Canadian Laws
· France Laws
· Indian Laws
· German Laws
· Italian Laws
· Greece Laws
· Denmark Laws
· Norwegian Laws
· Netherlands Laws
· Internet Crime Schemes
· Why You Should Report Cybercrime
· Reporting Computer-related Crimes
· Person Assigned to Report the Crime
· When and How to Report an Incident?
· Who to Contact at the Law Enforcement?
· Federal Local Agents Contact
· More Contacts
· Cyberthreat Report Form
Module 03: Computer Investigation Process
· Preparation for Searches
· Securing the Computer Evidence
· Chain-of Evidence Form
· Accessing the Policy Violation Case: Example
· 10 Steps to Prepare for a Computer Forensic Investigation
· Investigation Process
· Policy and Procedure Development
· Evidence Assessment
· Case Assessment
· Processing Location Assessment
· Legal Considerations
· Evidence Assessment
· Evidence Acquisition
· Write Protection
· Acquire the Subject Evidence
· Evidence Examination
· Physical Extraction
· Logical Extraction
· Analysis of Extracted Data
· Timeframe Analysis
· Data Hiding Analysis
· Application and File Analysis
· Ownership and Possession
· Documenting and Reporting
· What Should be in the Final Report?
· Maintaining Professional Conduct
Module 04: First Responder Procedure
· Electronic Evidence
· The Forensic Process
· Types of Electronic Devices
· Electronic Devices: Types and Collecting Potential Evidence
· Evidence Collecting Tools and Equipment
· First Response Rule
· Incident Response: Different Situations
· First Response for System Administrators
· First Response by Non-Laboratory Staff
· First Response by Laboratory Forensic Staff
· Securing and Evaluating Electronic Crime Scene
· Ask These Questions When A Client Calls A Forensic Investigator
· Health and Safety Issues
- Prerequisites & Certificates
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.
- Cancellation Policy
Student cancellations and/or rescheduling of public courses made within TEN (10) business days or less of the course start date will be charged at 100% of the full value.
- Map & Reviews
[ View Provider's Profile ]
ReviewsHere are some reviews of the training vendor.
This course has not yet been rated by one of our members.
If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.
This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.
This page has been viewed 160 times.