Download Now

Career Academy - Computer Hacking and Forensic Investigator Training CBT Boot Camp
Career Academy - Computer Hacking and Forensic Investigator Training CBT Boot Camp
Size: 12.17 GB Type: eLearning

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. This course will prepare you to pass the EC0 312-49 exam and achieve Computer Hacking Forensics Investigator (CHFI) certification.

Course Outline

Course Introduction
Course Introduction
Module 01 - Computer Forensics in Today�s World
Computer Forensics in Today�s World
Demo - Introduction to IAAC Website
Forensic Science
Computer Forensics
Security Incident Report
Demo - Security Research Studies
Aspects of Organizational Security
Evolution of Computer Forensics
objectives of Computer Forensics
Need for Computer Forensics
Benefits of Forensic Readiness
Goals of Forensic Readiness
Forensic Readiness Planning
Cyber Crime
Computer Facilitated Crimes
Modes of Attack
Examples of Cyber Crime
Types of Computer Crimes
How Serious Were Different Types of Incidents
Time Spent Responding to the Security Incident
Cyber Crime Investigation
Key Steps in Forensic Investigation
Demo - Crime Scene Processing
Rules of Forensic Investigation
Need for Forensic Investigation
Role of Forensics Investigation
Accessing Computer Forensic Resources
Role of Digital Evidence
Understanding Corporate Investigations
Approach to Forensic Investigation: A Case Study
When an Advocate Contacts the Forensic Investigator, He Specifies How to Approach the Crime Scene
Where and When Do You Use Computer Forensics
Enterprise Theory of Investigation (ETI)
Demo - FBI ETI Model
Legal Issues
Reporting the Results
Module 01 - Review
Module 02 - Computer Forensics Investigation Process
Computer Forensics Investigation Process
Investigating Computer Crime
Before the Investigation
Build a Forensics Workstation
Building Investigation Team
People Involved in Computer Forensics
Review Policies and Laws
Demo - Website Review
Demo - Extra Cyber Crime Resources
Forensics Laws
Notify Decision Makers and Acquire Authorization
Demo - Legal Resources
Risk Assessment
Build a Computer Investigation Toolkit
Demo - Forensics Toolkit of Documentation
Computer Forensics Investigation Methodology
Demo - DOJ Forensics Flow Chart
Steps to Prepare for a Computer Forensic Investigation
Obtain a Search Warrant
Searches Without a Warrant
Evaluate and Secure the Scene
Forensic Photography
Gather the Preliminary Information at Scene
First Responder
Demo - First Responder Guides
Collect the Evidence
Collect Physical Evidence
Evidence Collection Form
Collect Electronic Evidence
Guidelines in Acquiring Evidence
Secure the Evidence
Evidence Management
Chain of Custody
Chain of Custody Form
Demo - Chain of Custody
Original Evidence


Career Academy - Computer Hacking and Forensic Investigator Training CBT Boot Camp

Direct Download

Tags: Career, Academy, Computer, Hacking, Forensic, Investigator, Training

Add Comments:
Enter Code: *