CHFI: Computer Hacking Forensic Investigator
Short Description
Full Description
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
CHFI covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution.
It is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.
-
Module 01: Computer Forensics in Today's World
-
Module 02: Computer Forensics Investigation Process
-
Module 03: Understanding Hard Disks and File Systems
-
Module 04: Data Acquisition and Duplication
-
Module 05: Defeating Anti-Forensics Techniques
-
Module 06: Windows Forensics
-
Module 07: Linux and Mac Forensics
-
Module 08: Network Forensics
-
Module 09: Investigating Web Attacks
-
Module 10: Dark Web Forensics
-
Module 11: Database Forensics
-
Module 12: Cloud Forensics
-
Module 13: Investigating Email Crimes
-
Module 14: Malware Forensics
-
Module 15: Mobile Forensics
-
Module 16: IoT Forensics