• Presencial

Computer Hacking Forensic Investigator (CHFI)


The CHFI course will give participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?”.

Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

O curso inclui o respetivo exame de certificação. 

 

Destinatários

  • Police and other law enforcement personnel;
  • Defense and Military personnel;
  • e-Business Security professionals;
  • Systems administrators;
  • Legal, Banking, Insurance and other professionals;
  • Government agencies;
  • IT managers.

Pré-requisitos

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

Programa

  • Computer Forensics in Today’s World
  • Law and Computer Forensics
  • Computer Investigation Process
  • irst Responder Procedure
  • CSIRT
  • Computer Forensic Lab
  • Understanding File Systems and Hard Disks
  • Understanding Digital Media Devices
  • Windows, Linux and Macintosh Boot Processes
  • Windows Forensics
  • Linux Forensics
  • Data Acquisition and Duplication
  • Computer Forensic Tools
  • Forensics Investigations Using Encase
  • Recovering Deleted Files and Deleted partitions
  • Image Files Forensics
  • Steganography
  • Application Password Crackers
  • Network Forensics and Investigating Logs
  • Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Router Forensics
  • Investigating DoS Attacks
  • Investigating Internet Crimes
  • Tracking E-mails and Investigating E-mail Crimes
  • Investigating Corporate Espionage
  • Investigating Trademark and Copyright Infringement
  • Investigating sexually harassment incidents
  • Investigating Child Pornography
  • PDA Forensics
  • iPod Forensics
  • Blackberry Forensics
  • Investigative Reports
  • Becoming an Expert Witness.

Computer Hacking Forensic Investigator (CHFI)

Área

Dados

Como chegou até nós

Os seus dados pessoais são recolhidos em conformidade com o Regulamento Geral de Proteção de Dados (RGPD).
Consente que os seus dados sejam utilizados, nos termos da nossa Politica de Privacidade, para o contacto/envio de:

Ações de informação, de marketing de produtos e serviços, como campanhas e eventos?

Para mais informações, consulte a Política de Privacidade do Grupo Rumos.
pode retirar o seu consentimento a qualquer momento através do botão Cancelar subscrição ou Unsubscribe que estão presentes em cada comunicação enviada, bem como exercer os direitos descritos na politica de privacidade

Para a subscrição da newsletter deverá desativar o bloqueio de pop-ups do seu browser.