5 Days
- IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response Â
- Prior completion of CEH training would be an advantageÂ
- Information Security Analyst/Administrator
- Information Systems Security Engineer/Manager
- Information Security Professionals/Officers
- Information Security/IT Auditors
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
What you will learn:Â
- Perform incident response and forensicsÂ
- Perform electronic evidence collectionsÂ
- Perform digital forensic acquisitionsÂ
- Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.Â
- Examine and analyze text, graphics, multimedia, and digital imagesÂ
- Conduct thorough examinations of computer hard disk drives, and other electronic data storage mediaÂ
- Recover information and electronic data from computer hard drives and other data storage devicesÂ
- Follow strict data and evidence handling proceduresÂ
- Maintain audit trail (i.e., chain of custody) and evidence integrityÂ
- Work on technical examination, analysis and reporting of computer-based evidenceÂ
- Prepare and maintain case filesÂ
- Utilize forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other filesÂ
- Gather volatile and non-volatile information from Windows, MAC and LinuxÂ
- Recover deleted files and partitions in Windows, Mac OS X, and LinuxÂ
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurredÂ
- Apply advanced forensic tools and techniques for attack reconstructionÂ
- Perform fundamental forensic activities and form a base for advanced forensicsÂ
- Identify and check the possible source/incident originÂ
- Perform event co-relationÂ
- Computer Forensics in Today’s WorldÂ
- Computer Forensics Investigation ProcessÂ
- Understanding Hard Disks and File SystemsÂ
- Operating System ForensicsÂ
- Defeating Anti-Forensics TechniquesÂ
- Data Acquisition and DuplicationÂ
- Network ForensicsÂ
- Investigating Web AttacksÂ
- Database ForensicsÂ
- Cloud ForensicsÂ
- Malware ForensicsÂ
- Investigating Email CrimesÂ
- Mobile ForensicsÂ
- Investigative ReportsÂ
This course prepares you for the following certification:Â
- Computer Hacking Forensic InvestigatorÂ
