EC-Council Computer Hacking Forensic Investigator (CHFI) + Exam voucher [CHFI]

Dauer
Ausführung
Vor Ort, Online
Startdatum und Ort

EC-Council Computer Hacking Forensic Investigator (CHFI) + Exam voucher [CHFI]

Global Knowledge Network Netherlands B.V.
Logo von Global Knowledge Network Netherlands B.V.
Bewertung: starstarstarstarstar_border 7,6 Bildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von 7,6 (aus 153 Bewertungen)

Tipp: Haben Sie Fragen? Für weitere Details einfach auf "Kostenlose Informationen" klicken.

Startdaten und Startorte

placeNieuwegein (Iepenhoeve 5)
15. Jul 2024 bis 19. Jul 2024
Details ansehen
event 15. Juli 2024, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL229225.1
event 16. Juli 2024, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL229225.2
event 17. Juli 2024, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL229225.3
event 18. Juli 2024, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL229225.4
event 19. Juli 2024, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL229225.5
computer Online: VIRTUAL TRAINING CENTRE
15. Jul 2024 bis 19. Jul 2024
Details ansehen
event 15. Juli 2024, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL229225V.1
event 16. Juli 2024, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL229225V.2
event 17. Juli 2024, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL229225V.3
event 18. Juli 2024, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL229225V.4
event 19. Juli 2024, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL229225V.5
computer Online: VIRTUAL TRAINING CENTER
11. Nov 2024 bis 15. Nov 2024
Details ansehen
event 11. November 2024, 09:00-16:30, VIRTUAL TRAINING CENTER, NL229226.1
event 12. November 2024, 09:00-16:30, VIRTUAL TRAINING CENTER, NL229226.2
event 13. November 2024, 09:00-16:30, VIRTUAL TRAINING CENTER, NL229226.3
event 14. November 2024, 09:00-16:30, VIRTUAL TRAINING CENTER, NL229226.4
event 15. November 2024, 09:00-16:30, VIRTUAL TRAINING CENTER, NL229226.5
placeNieuwegein (Iepenhoeve 5)
10. Mär 2025 bis 14. Mär 2025
Details ansehen
event 10. März 2025, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL232867.1
event 11. März 2025, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL232867.2
event 12. März 2025, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL232867.3
event 13. März 2025, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL232867.4
event 14. März 2025, 09:00-16:30, Nieuwegein (Iepenhoeve 5), NL232867.5
computer Online: VIRTUAL TRAINING CENTRE
10. Mär 2025 bis 14. Mär 2025
Details ansehen
event 10. März 2025, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL232867V.1
event 11. März 2025, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL232867V.2
event 12. März 2025, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL232867V.3
event 13. März 2025, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL232867V.4
event 14. März 2025, 09:00-16:30, VIRTUAL TRAINING CENTRE, NL232867V.5

Beschreibung

Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge

Online of op locatie er is altijd een vorm die bij je past.

Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.

OVERVIEW

Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.

EC-Council’s Certified Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives orga…

Gesamte Beschreibung lesen

Frequently asked questions

Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!

Noch nicht den perfekten Kurs gefunden? Verwandte Themen: EC-Council, Hacking, Linux, Datenspeicherung und Datenschutz.

Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge

Online of op locatie er is altijd een vorm die bij je past.

Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.

OVERVIEW

Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.

EC-Council’s Certified Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.

The program is designed for IT professionals involved with information system security, computer forensics, and incident response. It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.

Please note an exam voucher is included with this course

OBJECTIVES

After completing this course you should be able to:

  • Perform electronic evidence collections
  • Perform digital forensic acquisitions
  • Conduct thorough examinations of computer hard disk drives and other electronic data storage media
  • Utilise forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files
  • Perform anti-forensics detection
  • Apply advanced forensic tools and techniques for attack reconstruction

AUDIENCE

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response. Individuals in industries such as Banking, Defense and Law Enforcement.

CERTIFICATION

Recommended as preparation for the following exams:

  • ECO 312-49 - CHFI Exam

 

CONTENT

Computer Forensics in Today’s World

  • Understand the Fundamentals of Computer Forensics
  • Understand Cybercrimes and their Investigation Procedures
  • Understand Digital Evidence
  • Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics
  • Identify the Roles and Responsibilities of a Forensic Investigator
  • Understand the Challenges Faced in Investigating Cybercrimes
  • Understand Legal Compliance in Computer Forensics

Computer Forensics Investigation Process

  • Understand the Forensic Investigation Process and its Importance
  • Understand the Pre-investigation Phase
  • Understand First Response
  • Understand the Investigation Phase
  • Understand the Post-investigation Phase

Understanding Hard Disks and File Systems

  • Describe Different Types of Disk Drives and their Characteristics
  • Explain the Logical Structure of a Disk
  • Understand Booting Process of Windows, Linux and Mac Operating Systems
  • Understand Various File Systems of Windows, Linux and Mac Operating Systems
  • Examine File System Using Autopsy and The Sleuth Kit Tools
  • Understand Storage Systems
  • Understand Encoding Standards and Hex Editors
  • Analyze Popular File Formats Using Hex Editor

Data Acquisition and Duplication

  • Understand Data Acquisition Fundamentals
  • Understand Data Acquisition Methodology
  • Prepare an Image File for Examination

Defeating Anti-forensics Techniques

  • Understand Anti-forensics Techniques
  • Discuss Data Deletion and Recycle Bin Forensics
  • Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
  • Explore Password Cracking/Bypassing Techniques
  • Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
  • Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
  • Detect Program Packers and Footprint Minimizing Techniques
  • Understand Anti-forensics Countermeasures
  • Anti-Forensics techniques

Windows Forensics

  • Collect Volatile and Non-volatile Information
  • Perform Windows Memory and Registry Analysis
  • Examine the Cache, Cookie and History Recorded in Web Browsers
  • Examine Windows Files and Metadata
  • Understand ShellBags, LNK Files, and Jump Lists
  • Understand Text-based Logs and Windows Event Logs

Linux and Mac Forensics

  • Understand Volatile and Non-volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Demonstrate Memory Forensics Using Volatility & PhotoRec
  • Understand Mac Forensics

Network Forensics

  • Understand Network Forensics
  • Explain Logging Fundamentals and Network Forensic Readiness
  • Summarize Event Correlation Concepts
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  • Perform Incident Detection and Examination with SIEM Tools
  • Monitor and Detect Wireless Network Attacks

Investigating Web Attacks

  • Understand Web Application Forensics
  • Understand Internet Information Services (IIS) Logs
  • Understand Apache Web Server Logs
  • Understand the Functionality of Intrusion Detection System (IDS)
  • Understand the Functionality of Web Application Firewall (WAF)
  • Investigate Web Attacks on Windows-based Servers
  • Detect and Investigate Various Attacks on Web Applications

Dark Web Forensics

  • Understand the Dark Web
  • Determine How to Identify the Traces of Tor Browser during Investigation
  • Perform Tor Browser Forensics

Database Forensics

  • Understand Database Forensics and its Importance
  • Determine Data Storage and Database Evidence Repositories in MSSQL Server
  • Collect Evidence Files on MSSQL Server
  • Perform MSSQL Forensics
  • Understand Internal Architecture of MySQL and Structure of Data Directory
  • Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis
  • Perform MySQL Forensics on WordPress Web Application Database

Cloud Forensics

  • Understand the Basic Cloud Computing Concepts
  • Understand Cloud Forensics
  • Understand the Fundamentals of Amazon Web Services (AWS)
  • Determine How to Investigate Security Incidents in AWS
  • Understand the Fundamentals of Microsoft Azure
  • Determine How to Investigate Security Incidents in Azure
  • Understand Forensic Methodologies for Containers and Microservices

Investigating Email Crimes

  • Understand Email Basics
  • Understand Email Crime Investigation and its Steps
  • U.S. Laws Against Email Crime

Malware Forensics

  • Define Malware and Identify the Common Techniques Attackers Use to Spread Malware
  • Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis
  • Understand and Perform Static Analysis of Malware
  • Analyze Suspicious Word and PDF Documents
  • Understand Dynamic Malware Analysis Fundamentals and Approaches
  • Analyze Malware Behavior on System Properties in Real-time
  • Analyze Malware Behavior on Network in Real-time
  • Describe Fileless Malware Attacks and How they Happen
  • Perform Fileless Malware Analysis - Emotet

Mobile Forensics

  • Understand the Importance of Mobile Device Forensics
  • Illustrate Architectural Layers and Boot Processes of Android and iOS Devices
  • Explain the Steps Involved in Mobile Forensics Process
  • Investigate Cellular Network Data
  • Understand SIM File System and its Data Acquisition Method
  • Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices
  • Perform Logical Acquisition on Android and iOS Devices
  • Perform Physical Acquisition on Android and iOS Devices
  • Discuss Mobile Forensics Challenges and Prepare Investigation Report

IOT Forensics

  • Understand IoT and IoT Security Problems
  • Recognize Different Types of IoT Threats
  • Understand IoT Forensics
  • Perform Forensics on IoT Devices

Werden Sie über neue Bewertungen benachrichtigt

Es wurden noch keine Bewertungen geschrieben.

Schreiben Sie eine Bewertung

Haben Sie Erfahrung mit diesem Kurs? Schreiben Sie jetzt eine Bewertung und helfen Sie Anderen dabei die richtige Weiterbildung zu wählen. Als Dankeschön spenden wir € 1,00 an Stiftung Edukans.

Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!

Bitte füllen Sie das Formular so vollständig wie möglich aus

(optional)
(optional)
(optional)
(optional)
(optional)
(optional)

Haben Sie noch Fragen?

(optional)

Anmeldung für Newsletter

Damit Ihnen per E-Mail oder Telefon weitergeholfen werden kann, speichern wir Ihre Daten.
Mehr Informationen dazu finden Sie in unseren Datenschutzbestimmungen.