About
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry out a computer forensic investigation.
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.
- Computer Forensics and Investigations as aProfession
- Understanding Computer Investigations
- Working with Windows and DOS Systems
- Macintosh and Linux Boot Processes and Disk
- The Investigators Office and Laboratory
- Current Computer Forensics Tools
- Digital Evidence Controls
- Processing Crime and Incident Scenes
- Data Acquisition
- Computer Forensic
- E-mail Investigations
- Recovering Image Files
- Writing Investigation
- Becoming an Expert
- Computer Security Incident Response
- Logfile
- Recovering Deleted Files
- Application Password
- Investigating E-Mail
- Investigating Web
- Investigating Network
- Investigating Router
- The Computer Forensics
- Data Duplication
- Windows Forensics
- Linux Forensics
- Investigating PDA
- Enforcement Law and Prosecution
- Investigating Trademark and Copyright Infringement
Solid knowledge on networking and OS’s including servers, IP Addressing and Applications & Hacking