Computer Hacking Forensic Investigator
Course Description The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top toolsof the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battlesbetween corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.Who Should Attend Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers Prerequisites It is strongly recommended that you attend the CEH class before enrolling into CHFI program. Duration 5 days (9:00 – 5:00)http://www.eccouncil.org
Certification The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification. Page Course Outline v3 Module 0: Computer Forensics in Today’s World Ways of Forensic Data Collection Objectives of Computer Forensics Benefits of Forensic Readiness Categories of Forensics DataComputer Facilitated Crimes Type of Computer Crimes Examples of Evidence Stages of Forensic Investigation in Tracking Cyber Criminals Key Steps in Forensics Investigations Need for Forensic Investigator When An Advocate Contacts The Forensic Investigator, He Specifies How To Approach Enterprise Theory of Investigation (ETI) Where and when do you use Computer Forensics? Legal Issues Reporting theResults Module 0: Law and Computer Forensics Privacy Issues Involved in Investigations Fourth Amendment Definition Interpol- Information Technology Crime Center Internet Laws and Statutes Intellectual Property Rights Cyber Stalking Crime Investigating Organizations The G8 Countries: Principles to Combat High-tech Crime The G8 Countries: Action Plan to Combat High-Tech Crime (International Aspects ofComputer Crime) United Kingdom: Police and Justice Act 2006 Australia: The Cybercrime Act 2001 Belgium
European Laws Austrian Laws Brazilian Laws Belgium Laws Canadian Laws France Laws Indian Laws German Laws Italian Laws Greece Laws Denmark Laws Norwegian Laws Netherlands Laws Internet Crime Schemes Why You Should Report Cybercrime ReportingComputer-related Crimes Person Assigned to Report the Crime When and How to Report an Incident? Who to Contact at the Law Enforcement? Federal Local Agents Contact More Contacts Cyberthreat Report Form Module 0: Computer Investigation Process Securing the Computer Evidence Preparation for Searches Chain-of Evidence Form Accessing the Policy Violation Case: Example 10 Steps to Prepare for a ComputerForensic Investigation Investigation Process Policy and Procedure Development Evidence Assessment Case Assessment Processing Location Assessment Legal Considerations Evidence Assessment Evidence Acquisition
Write Protection Acquire the Subject Evidence Evidence Examination Physical Extraction Logical Extraction Analysis of Extracted Data Timeframe...
Leer documento completo
Regístrate para leer el documento completo.