Computer Hacking Forensic Investigator

This course presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script><script> hbspt.forms.create({ region: "na1", portalId: "8057651", formId: "6a3ff7a7-c223-47d4-9399-1559c6940d97" });</script>
Live instructor-led
Onsite or Virtual / Public or Private Class
5 training days (Live Training) + Examination

Enhance your skills to handle the next cybersecurity incident effectively and boost your employability:

Learn How To Detect & Handle Real-World Incidents Methodically.
Extensive coverage of Malware Forensics (incl. Emotet and EternalBlue)
Significant coverage of forensic methodologies for public cloud infrastructure (Amazon AWS, Microsoft Azure, etc.)
Gain access to the latest forensic tools including Splunk, DNSQuerySniffer, etc.

Prerequisites:

The E|CHFI course is designed for all IT professionals involved with system security, computer forensics and incident response.

Who Should Attend:

E|CHFI is an advanced-level course that is designed for law enforcement personnel, system administrators, security officers, defence and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of network infrastructure.

Business Outcomes:

  • Comprehensive forensics investigation process
  • Forensics of file systems, operating systems, network and database, websites, and email systems
  • Techniques for investigating on cloud, malware, and mobile
  • Data acquisition and analysis as well as anti-forensic techniques
  • Thorough understanding of chain of custody, forensic report, and presentation

Curriculum Outline:

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Data Acquisition and Duplication
  • Defeating Anti-forensics Techniques
  • Windows Forensics
  • Linux and Mac Forensics
  • Network Forensics

And...

  • Investigating Web Attacks
  • Dark Web Forensics
  • Database Forensics
  • Cloud Forensics
  • Investigating Email Crimes
  • Malware Forensics
  • Mobile Forensics
  • IoT Forensics

OUR EXPERT INSTRUCTORS

Col. Rajesh Dubey

General Manager at ITI Ltd

Col. Rajesh Dubey

General Manager at ITI Ltd

Dr Athirah Mohd Ramly

Lecturer at Sunway University, Department of Computing and Information Systems

Dr Athirah Mohd Ramly

Lecturer at Sunway University, Department of Computing and Information Systems

Prefer personalised consultation on corporate training?

<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script><script> hbspt.forms.create({ region: "na1", portalId: "8057651", formId: "6a3ff7a7-c223-47d4-9399-1559c6940d97" });</script>

WHAT LEARNERS SAY