CHFI - EC-Council Computer Hacking Forensic Investigator (SF)
About This Course
• Learn to perform anti-forensic methods detection
• Learn to perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
• Learn to extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches, AD server, DHCP logs, Access Control Logs & conclude as part of investigation process
• Learn to identify & check the possible source / incident origin
• Learn to recover deleted files and partitions in Windows, Mac OS X, and Linux
• Gain understanding in conducting reverse engineering for known and suspected malware files
• Learn to collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
What You'll Learn
Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors. Cyber Security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams.
Entry Requirements
Candidates with basic knowledge in incident response, cybersecurity and computer forensics