Computer Hacking Forensics Investigator (CHFI v9)

Formation inter-entreprise

À qui s'adresse la formation?

Professionnels de la sécurité informatique, Professionnels de l’IT, Professionnels du secteur informatique, Responsable Sécurité

Durée

5,00 jour(s)

Langues(s) de prestation

EN FR

Prochaine session

02.01.2025
Lieu
Windhof (Koerich)

Prix

3855,00€

Prérequis

The CEH certification es recommended but not mandatory

Objectifs

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?"

Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

The process of investigating cyber-crime, laws involved, and the details in obtaining a search warrant.

  • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • How to track e-mails and investigate e-mail crimes and many more.
  • Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene.
  • How to investigate logs, network traffic, wireless attacks, and web attacks.
  • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux.
  • Different types of log capturing techniques, log management, time synchronization, log capturing tools.
  • The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques.

Contenu

EC-Council releases the most advanced Computer Forensic Investigation program in the world.

  • CHFIv9 presents a detailed methodological approach to computer forensics and evidence analysis.
  • It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
  • Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
  • Computer forensics training teaches that computer forensics investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
  • Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.
  • Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud.
  • Computer Hacking Forensic investigators (CHFI) can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
  • Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases.

Certificat, diplôme

Une attestation de participation sera transmise aux participants

Prochaine session

Date
Ville
Language & prix
02.01.2025

06.01.2025
Windhof (Koerich)
FR 3855,00€

Contact pour cette formation

Nathalie Thielemans / Nassera Aici

Ces formations pourraient vous intéresser

FR
Journée
Informatique et systèmes d'information - Système de gestion de base de données - Logiciel SGBD relationnel - Logiciel SQL Server
18.12.2024
FR
Journée
Windhof (Koerich)
Informatique et systèmes d'information - Analyse programmation - Méthode analyse
25.12.2024
FR
Journée
Windhof (Koerich)
Informatique et systèmes d'information - Système information - Architecture système information - Cloud Computing
09.01.2025