Computer Hacking Forensic Investigator analyses the hacking concerns and gather evidences to report a crime and take measures preventing future attacks.
Finds out all the data in computer system ̶ deleted, encrypted or corrupted files’ information.
The certification course covers all prime forensic investigation conditions, techniques and standard tools used in investigation for later prosecution in law court.
Understand analysis and reporting the digital data evidences.
What you’ll master?
Computer Forensics Investigation Process.
Operating System Forensics.
Anti-forensic detection methods.
Understanding aspects of Network Forensics.
Some Sample Videos:
Class:1- Getting started with Computer Hacking Forensic Investigator (CHFI).
Class:2- Introduction of computer forensics.
Class:3 - About Forensic Readiness.
Class:4 - An outline of Cyber Crime.
Class:5 - Session on Web Applications.
Class: 6 - Tutorial on Webservers Attacks.
Class:7 - Email Crimes explanation.
Class: 8 - Tutorial on Network Attacks.
Class:9 - Introduction of Forensics and Mobile Devices.
Class: 10 - An outline of Cyber Crime Investigation.
Class: 11 - Methodology of Computer Forensics Investigation.
Class: 12 - Tutorial about reporting to the Cyber Crime?
Class: 13 - Understanding Expert Witness.
Class: 14 - How to Search and Seize Computers with and without a Warrant?
Class: 15 - Know about Laws and Acts against Email Crimes.
Class: 16 - Session about Laws about Log Management.
Class: 17 - Session about Policies About Mobile Forensics.
Class: 18 - Important thing about Laws and Acts against Email Crimes.
Class: 19 - Know about the general Ethics (in Testifying)
Class: 20 - Understanding the Digital Evidence.
Class:21 - Enterprise Theory of Investigation (ETI) Outline.
Class:22 - Session on different types of Digital Evidence.
Class:23 - About Rules of Evidence.
Class:24 - Overview of Electronic Evidence.
Class:25 - How Electronic Crime and Digital Evidence Considered by Crime Category?
Class:26 - Computer Forensics Lab fundamentals.
Class: 27 - Fundamentals of Hard Disks.
Class: 28 - Analysis of Disk Partitions and Boot Process.
Class: 29 - Basics of File Systems.
Class: 30 - Windows File Systems basics.
Class:31- Overview of Linux File Systems.
Class:32- Mac OS X File Systems basics.
Class:33- Introduction of RAID Storage System.
Class:34 - Know about File Carving.
Class:35 - Know about Image File Formats.
Class:36 - Tutorial about Analyze Logs.
Class:37 - Database Forensics explanation.
Class: 38 - How to Perform MySQL Forensics?
Class: 39 - Introduction of Email Headers.
Class: 40 - Understanding the various steps involved in the investigation of Email crimes.
Class: 41 - How to analyze Email headers?
Class: 42 - Outline of Malware Analysis.
Class: 43 - How to Perform static and dynamic malware analysis?
Class: 44 - Understanding Mobile Operating Systems.
Class: 45 - Know about the hardware and software characteristics of mobile devices.
Class: 46 - Know the process involved in mobile forensics.
Class: 47 - How to investigate Computer Crime?
Class: 48 - Session on Computer Forensics Investigation Methodology.
Class: 49 - An advanced tutorial on Computer Forensics Investigation Methodology.
Class:50 - Lesson on Digital Evidence Examination Process
Class:51 - How to Prepare reports to document analysis?
Class:52 - Fundamentals of Encryption.
Class:53 - About First Responder.
Class:54 - First Response fundamentals.
Class:55 - Understanding First Responder Role.
Class:56 - Data Acquisition and Duplication Intro.
Class:57 - How to identify Anti-Forensics Techniques?
Class: 58 - How to Recover Deleted Files and Partitions?
Class: 59 - How to detect steganography and identify the hidden content?
Class: 60 - About Log Management and Event Correlation.
Class:61- Intrusion Detection Systems overview.
Class:62- Introduction of Computer Forensics Reports and Investigative Report Writing.
Class:63- Importance of Recover Data
Class:64- An outline of Windows Forensics.
Class:65 - Tutorial on Linux Forensics.
Class: 66 - Tutorial on MAC Forensics.
Class:67 - How to Recover the Deleted Files and Partitions?
Class:68 - Understanding Steganography and Image File Forensics.
Class:69 - Steganalysis explanation.
Class: 70 - About Application Password Crackers
Class: 71 - How to investigate and analyze Logs?
Class: 72 - How to investigate Network Traffic?
Class: 73 - Tutorial on Investigating Wireless Attacks.
Class: 74 - Web Attack Investigation tutorial.
Class: 75 - Tutorial on Investigating Email Crime and Violation.
Class: 76 - Understanding Mobile Forensic Process.
Class: 77 - A little bit about Cloud Forensics.
Class: 78 - A complete analysis of Malware Forensics.
Class:79 - Session about defeating the Anti-Forensic Techniques.
Class:80 - Learn about the First Responder Toolkit.
Class:81 - Windows Forensic Tools fundamentals.
Class:82 - Overview of Data Acquisition Software Tools.
Class:83 - Learn the tools to defeat Anti-Forensics.
Class:84 - Tutorial on Steganography Tools.
Class:85 - Tutorial on Database Forensics Tools.
Class:86 - How to use Password Cracking Tools and Network Forensics Tools?
Class: 87 - Know the Web Security Tools and Web Attack Investigation Tools.
Class: 88 - About Cloud Forensics Tools and Malware Forensics Tools.
Class: 89 - Session on Email Forensics Tools and Report Writing Tools.
Class: 90 - Tutorial on Mobile Forensics Software and Hardware Tools.
Schedule Your Classes
The duration of the Course is 3 Months (90 days)
Weekdays - Monday to Saturday.
Weekend classes - Saturday and Sunday.
Class Consist of both Theory and Practical session.
Materials will be provided.
Please note that the Training Structure may vary for every student.
Have a Question?
Please send us any questions you may have. We would love to answer it.