EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
Module | Topic |
---|---|
Module 01 | Computer Forensics in Today's World |
Module 02 | Computer Forensics Investigation Process |
Module 03 | Searching and Seizing Computers |
Module 04 | Digital Evidence |
Module 05 | First Responder Procedures |
Module 06 | Computer Forensics Lab |
Module 07 | Understanding Hard Disks and File Systems |
Module 08 | Windows Forensics |
Module 09 | Data Acquisition and Duplication |
Module 10 | Recovering Deleted Files and Deleted Partitions |
Module 11 | Forensics Investigation using Access Data FTK |
Module 12 | Forensics Investigation Using EnCase |
Module 13 | Steganography and Image File Forensics |
Module 14 | Application Password Crackers |
Module 15 | Log Capturing and Event Correlation |
Module 16 | Network Forensics, Investigating Logs and Investigating Network Traffic |
Module 17 | Investigating Wireless Attacks |
Module 18 | Investigating Web Attacks |
Module 19 | Tracking Emails and Investigating Email Crimes |
Module 20 | Mobile Forensics |
Module 21 | Investigative Reports |
Module 22 | Becoming an Expert Witness |
Fill out our simple form to learn how we can help your business thrive