Computer Hacking Forensic Investigator
Computer Hacking Forensic Investigator
Computer Hacking Forensic Investigator

Computer Hacking Forensic Investigator

This course presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.Contact Us

Ideal For

The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.

The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.

The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.

What to Expect

SKILL LEVEL
Intermediate
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English

Skills You Will Learn

  • Computer Forensics in Today’s World

  • Computer Forensics Investigation Process

  • Understanding Hard Disks and File Systems

  • Data Acquisition and Duplication

  • Defeating Anti-forensics Techniques

  • Windows Forensics

  • Linux and Mac Forensics

  • Network Forensics

  • Computer Forensics in Today’s World

  • Computer Forensics Investigation Process

  • Understanding Hard Disks and File Systems

  • Data Acquisition and Duplication

  • Defeating Anti-forensics Techniques

  • Windows Forensics

  • Linux and Mac Forensics

  • Network Forensics

  • Computer Forensics in Today’s World

  • Computer Forensics Investigation Process

  • Understanding Hard Disks and File Systems

  • Data Acquisition and Duplication

  • Defeating Anti-forensics Techniques

  • Windows Forensics

  • Linux and Mac Forensics

  • Network Forensics

  • Investigating Web Attacks

  • Dark Web Forensics

  • Database Forensics

  • Cloud Forensics

  • Investigating Email Crimes

  • Malware Forensics

  • Mobile Forensics

  • IoT Forensics

  • Investigating Web Attacks

  • Dark Web Forensics

  • Database Forensics

  • Cloud Forensics

  • Investigating Email Crimes

  • Malware Forensics

  • Mobile Forensics

  • IoT Forensics

  • Investigating Web Attacks

  • Dark Web Forensics

  • Database Forensics

  • Cloud Forensics

  • Investigating Email Crimes

  • Malware Forensics

  • Mobile Forensics

  • IoT Forensics

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Course Outcome

  • Comprehensive forensics investigation process

  • Forensics of file systems, operating systems, network and database, websites, and email systems

  • Techniques for investigating on cloud, malware, and mobile

  • Data acquisition and analysis as well as anti-forensic techniques

  • Thorough understanding of chain of custody, forensic report, and presentation

  • Comprehensive forensics investigation process

  • Forensics of file systems, operating systems, network and database, websites, and email systems

  • Techniques for investigating on cloud, malware, and mobile

  • Data acquisition and analysis as well as anti-forensic techniques

  • Thorough understanding of chain of custody, forensic report, and presentation

  • Comprehensive forensics investigation process

  • Forensics of file systems, operating systems, network and database, websites, and email systems

  • Techniques for investigating on cloud, malware, and mobile

  • Data acquisition and analysis as well as anti-forensic techniques

  • Thorough understanding of chain of custody, forensic report, and presentation

Course Intake

1 Jan 2025 → 1 March 2025

2 days | Monday and Thursday | 8PM → 10PM

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2