Computer Hacking Forensic Investigator
Computer Hacking Forensic Investigator
Computer Hacking Forensic Investigator

Computer Hacking Forensic Investigator

This course presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.Contact Us

Ideal For

The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.

The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.

The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.

What to Expect

SKILL LEVEL
Intermediate
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English

Skills You Will Learn

  • Computer Forensics in Today’s World

  • Computer Forensics Investigation Process

  • Understanding Hard Disks and File Systems

  • Data Acquisition and Duplication

  • Defeating Anti-forensics Techniques

  • Windows Forensics

  • Linux and Mac Forensics

  • Network Forensics

  • Computer Forensics in Today’s World

  • Computer Forensics Investigation Process

  • Understanding Hard Disks and File Systems

  • Data Acquisition and Duplication

  • Defeating Anti-forensics Techniques

  • Windows Forensics

  • Linux and Mac Forensics

  • Network Forensics

  • Computer Forensics in Today’s World

  • Computer Forensics Investigation Process

  • Understanding Hard Disks and File Systems

  • Data Acquisition and Duplication

  • Defeating Anti-forensics Techniques

  • Windows Forensics

  • Linux and Mac Forensics

  • Network Forensics

  • Investigating Web Attacks

  • Dark Web Forensics

  • Database Forensics

  • Cloud Forensics

  • Investigating Email Crimes

  • Malware Forensics

  • Mobile Forensics

  • IoT Forensics

  • Investigating Web Attacks

  • Dark Web Forensics

  • Database Forensics

  • Cloud Forensics

  • Investigating Email Crimes

  • Malware Forensics

  • Mobile Forensics

  • IoT Forensics

  • Investigating Web Attacks

  • Dark Web Forensics

  • Database Forensics

  • Cloud Forensics

  • Investigating Email Crimes

  • Malware Forensics

  • Mobile Forensics

  • IoT Forensics

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Course Outcome

  • Comprehensive forensics investigation process

  • Forensics of file systems, operating systems, network and database, websites, and email systems

  • Techniques for investigating on cloud, malware, and mobile

  • Data acquisition and analysis as well as anti-forensic techniques

  • Thorough understanding of chain of custody, forensic report, and presentation

  • Comprehensive forensics investigation process

  • Forensics of file systems, operating systems, network and database, websites, and email systems

  • Techniques for investigating on cloud, malware, and mobile

  • Data acquisition and analysis as well as anti-forensic techniques

  • Thorough understanding of chain of custody, forensic report, and presentation

  • Comprehensive forensics investigation process

  • Forensics of file systems, operating systems, network and database, websites, and email systems

  • Techniques for investigating on cloud, malware, and mobile

  • Data acquisition and analysis as well as anti-forensic techniques

  • Thorough understanding of chain of custody, forensic report, and presentation

Course Intake

1 Jan 2025 → 1 March 2025

2 days | Monday and Thursday | 8PM → 10PM

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2