EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
| Module | Topic |
|---|---|
| Module 01 | Computer Forensics in Today's World |
| Module 02 | Computer Forensics Investigation Process |
| Module 03 | Searching and Seizing Computers |
| Module 04 | Digital Evidence |
| Module 05 | First Responder Procedures |
| Module 06 | Computer Forensics Lab |
| Module 07 | Understanding Hard Disks and File Systems |
| Module 08 | Windows Forensics |
| Module 09 | Data Acquisition and Duplication |
| Module 10 | Recovering Deleted Files and Deleted Partitions |
| Module 11 | Forensics Investigation using Access Data FTK |
| Module 12 | Forensics Investigation Using EnCase |
| Module 13 | Steganography and Image File Forensics |
| Module 14 | Application Password Crackers |
| Module 15 | Log Capturing and Event Correlation |
| Module 16 | Network Forensics, Investigating Logs and Investigating Network Traffic |
| Module 17 | Investigating Wireless Attacks |
| Module 18 | Investigating Web Attacks |
| Module 19 | Tracking Emails and Investigating Email Crimes |
| Module 20 | Mobile Forensics |
| Module 21 | Investigative Reports |
| Module 22 | Becoming an Expert Witness |
Fill out our simple form to learn how we can help your business thrive