Course details
What Will Be Taught For This Computer Forensics Course?
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFI V9 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
Module 01: Computer Forensics in Today's World
Understanding Computer Forensics
Why and When Do You Use Computer Forensics?
Cyber Crime (Types of Computer Crimes)
Case Study
Challenges Cyber Crimes Present For Investigators
Cyber Crime Investigation
Rules of Forensics Investigation
Understanding Digital Evidence
Types of Digital Evidence
Characteristics of Digital Evidence
Role of Digital Evidence
Sources of Potential Evidence
Rules of Evidence
Forensics Readiness
Computer Forensics as part of an Incident Response Plan
Need for Forensic Investigator
Roles and Responsibilities of Forensics Investigator
What makes a Good Computer Forensics Investigator?
Investigative Challenges
Legal and Privacy Issues
Code of Ethics
Accessing Computer Forensics
Module 02: Computer Forensics Investigation Process
Importance of Computer Forensics Process
Phases Involved in the Computer Forensics Investigation Process
Pre-investigation Phase
Investigation Phase
Post-investigation Phase
Module 03: Understanding Hard Disks and File Systems
Hard Disk Drive Overview
Disk Partitions and Boot Process
Understanding File Systems
RAID Storage System
File System Analysis
Module 04: Data Acquisition and Duplication
Data Acquisition and Duplication Concepts
Static Acquisition
Validate Data Acquisitions
Acquisition Best Practices
Module 05: Defeating Anti-forensics Techniques
What is Anti-Forensic?
Anti-Forensics Techniques
Module 06: Operating System Forensics (Windows, Mac, Linux)
Introduction to OS Forensics
Windows Forensics
Collecting Volatile Information
Collecting Non-Volatile Information
Analyze the Windows thumbcaches
Windows Memory Analysis
Windows Registry Analysis
Cache, Cookie, and History Analysis
Windows File Analysis
Metadata Investigation
Text Based Logs
Other Audit Events
Forensic Analysis of Event Logs
Windows Forensics Tools
Linux Forensics
Shell Commands
Linux Log files
Collecting Volatile Data
Collecting Non-Volatile Data
MAC Forensics
Introduction to MAC Forensics
MAC Forensics Data
MAC Log Files
MAC Directories
MAC Forensics Tools
Module 07: Network Forensics
Introduction to Network Forensics
Fundamental Logging Concepts
Event Correlation Concepts
Network Forensic Readiness
Network Forensics Steps
Network Traffic Investigation
Documenting the Evidence
Evidence Reconstruction
Module 08: Investigating Web Attacks
Introduction to Web Application Forensics
Web Attack Investigation
Investigating Web Server Logs
Web Attack Detection Tools
Tools for Locating IP Address
WHOIS Lookup Tools
Module 09: Database Forensics
Database Forensics and Its Importance
MSSQL Forensics
MySQL Forensics
Module 10: Cloud Forensics
Introduction to Cloud Computing
Cloud Forensics
Module 11: Malware Forensics
Introduction to Malware
Introduction to Malware Forensics
Module 12: Investigating Email Crimes
Email System
Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
Email Message
Steps to Investigate Email Crimes and Violation
Email Forensic Tools
Laws and Acts against Email Crimes
Module 13: Mobile Phone Forensics
Mobile Device Forensics
Module 14: Forensics Report Writing and Presentation
Writing Investigation Reports
Expert Witness Testimony
Eligibility / Requirements
The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.Pre-requisiteParticipants are strongly recommended to attend the CEH course before enrolling into CHFI course.
About COMAT Training Services Pte Ltd
To be or not to be; this is the question which resides in us. All man of clay, our innate differences are subtle and few. The void spanning greatness hinges on existence of mean and will. COMAT holds an intrinsic belief that every inpidual has a potential to be realised. Betterment of society through advancement of its basic unit, empowerment through continuous learning – Upon these axioms were we founded, and today proudly uphold.
Love for the people around us, a desire for a better world, our passion is our profession. COMAT believes learning is a lifelong process and key to a meaningful existence. Spearheaded by a renowned team of highly experienced and motivated trainers, COMAT offers an extensive array of IT, safety and leadership & professional development courses, providing inpiduals with the means to excel.
While adhering to globally accepted quality standards, our intention goes beyond training and certification - COMAT provides a holistic experience, focusing on generation of inductive environments for stimulating philosophical thoughts. True learning lies in instillation of a sense of self-realisation, a will to become who they can be.
We pride ourselves on our innovations, our desire for continuous improvement, and the ability to perceive the needs and wants of each inpidual. Customized approaches for varying needs, we conjure solutions tailored to fit.
See all COMAT Training Services Pte Ltd courses- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Cyber Security Level 5 Course LineSGD 32
SGD 728Duration: Upto 12 Hours - Ethical Hacking Beginner To Expert Academy for Health & FitnessSGD 17Duration: Upto 5 Hours