Sale!

Computer Hacking Forensic Investigator (CHFI)

Original price was: ₹5,083.90.Current price is: ₹3,999.00.

SKU: N/A Category: Tag:

Description

Overview:

This course is designed for a student who wants to go in the field of Computer Forensics or Digital Forensics. Computer Forensic is a comprehensive program focusing on the latest way for data acquisition techniques and data retrieval techniques in a forensically sound manner so that the evidence can be presented in the court. Real time demonstration of latest forensic techniques, methodologies, tools, tricks and integrity measures.

Prerequisites:

  • Basic Computer Knowledge & Ethical Hacking Concepts

Key Learning Outcomes:

After completing this course, you will be able to know about forensically handle data and retrieval of data from any evidence media.

Target Audience

  • Students who want to get selected in Top-Tier IT Companies like TCS, Infosys, Microsoft, Samsung, Google, Amazon, Facebook, Wipro and all leading MNC’s of the world.
  • M. Tech/B. Tech/MCA/BCA/Any Graduate or Diploma Holder

Test & Evaluation

  • During the program, the participants will have to take all assignments given to them for better learning.
  • At the end of the program, a final assessment will be conducted.

Certification

  • All successful participants will be provided with a certificate of completion.
  • Students who do not complete the course / leave it midway will not be awarded any certificate.

      Duration: 100 hours (40 hours ONLINE LIVE sessions + 60 Hours of assignment)

      Delivery Mode: 100 % Online Live Instructor LED Training

Additional information

Winter Training Program

Dec, Jan

Module 1 – Computer Forensics in Today’s World

  • Understanding Computer Forensics
  • Cyber Crime (Types of Computer Crimes)
  • Cyber Crime Investigation
  • Rules of Forensics Investigation
  • Understanding Digital Evidence
  • Rules of Evidence
  • Forensics Readiness

Module 2 – Computer Forensics Investigation Process

  • Phases Involved in the Computer Forensics Investigation Process
  • Pre-investigation Phase
  • Investigation Phase
  • Post-investigation Phase

Module 3 – Understanding Hard Disks and File Systems

  • Hard Disk Drive Overview
  • Disk Partitions and Boot Process
  • Understanding File Systems
  • RAID Storage System
  • File System Analysis

Module 4 – Data Acquisition and Duplication

  • Data Acquisition and Duplication Concepts
  • Static Acquisition
  • Validate Data Acquisitions

Module 5 – Defeating Anti-forensics Techniques

  • Anti-Forensics techniques
  • Password Protection
  • Recovering the Deleted Partitions
  • Steganography
  • Steganalysis
  • Artifact Wiping

      Module 6 – Operating System Forensics (Windows, Mac, Linux)

  • Windows Forensics
  • Linux Forensics
  • MAC Forensics

Module 7 – Network Forensics

  • Introduction to Network Forensics
  • Fundamental Logging Concepts
  • Event Correlation Concepts
  • Network Forensic Readiness
  • Network Traffic Investigation
  • Documenting the Evidence
  • Evidence Reconstruction

Module 8 – Investigating Web Attacks

  • Web Attack Investigation
  • Investigating Web Server Logs
  • Tools for Locating IP Address

Module 9 – Database Forensics

  • MSSQL Forensics
  • MySQL Forensics

Module 10 – Cloud Forensics

  • Usage of Cloud Forensics
  • Stakeholders and their Roles
  • Investigating Cloud Storage Services

Module 11 – Malware Forensics

  • Malware Analysis: Static
  • Malware Analysis: Dynamic
  • Analysis of Malicious Documents
  • Malware Analysis Challenges

Module 12 – Investigating Email Crimes

  • Email System
  • Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
  • Steps to Investigate Email Crimes and Violation
  • Examine E-mail Messages
  • Laws and Acts against Email Crimes

Module 13 – Mobile Phone & IOT Forensics

  • Mobile Forensics Process
  • Forensics Imaging
  • Platform Security Removal Techniques: Jailbreaking/Rooting
  • Android Forensics Analysis

Module 14 – Dark Web Forensics

  • Dark Web Forensics
  • Tor Browser Investigation
  • Checking Files

Module 15 – Forensics Report Writing and Presentation

  • Writing Investigation Reports
  • Expert Witness Testimony
  • Deposition
  • Dealing with Media

You can also give us a call on Mobile +91-9335469335