Search:  
Western Cape Business News


840
VIEWS

Send  Share  Twitter
Company News

EC-Council Computer hacking forensics investigator

 


Recent Company News

EC Council's CHFI: Computer Hacking Forensics Investigator certification training course from StudyITonline provides students with the necessary training to identify a hacker or intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. Computer Hacking Forensic Investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. With the CHFI certification, you will begin to understand the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.

 

StudyITonline's CHFI training course will immerse the student into an interactive environment where they will trace the tracks of a hacker through a client’s systems, trace the originator of defamatory emails, and recover signs of fraud. Students will learn CHFI investigation methods for discovering data that resides in a computer system and recovering deleted, encrypted, or damaged file information. CHFI is a vendor-neutral certification that validates knowledge in securing and analyzing electronic evidence.

StudyITonline is an EC-Council Authorized Training Provider for online training, ensuring our course follows the approved curriculum and you receive the training and knowledge needed to succeed. StudyITonline is so certain this course meets and exceeds the exam objectives, we guarantee you will pass your exam!


CHFI: Computer Hacking Forensics Investigator

Module 01: Computer Forensics in Today’s World
Module 02: Law And Computer Forensics
Module 03: Computer Investigation Process
Module 04: Computer Security Incident Response Team
Module 05: Computer Forensic Laboratory Requirements
Module 06: Understanding File systems and Hard disks
Module 07: Windows Forensics
Module 08: Linux and Macintosh Boot processes
Module 09: Data Acquisition and Duplication
Module 10: Recovering Deleted Files
Module 11: Image Files Forensics
Module 12: Steganography
Module 13: Computer Forensic Tools
Module 14: Application password crackers
Module 15: Investigating Logs
Module 16: Investigating network traffic
Module 17: Router Forensics
Module 18: Investigating Web Attacks
Module 19: Tracking E-mails and Investigating E-mail crimes
Module 20: Mobile and PDA Forensics
Module 21: Investigating Trademark and Copyright Infringement
Module 22: Investigative Reports
Module 23: Becoming an Expert Witness
Module 24: Forensics in action

Date Posted: 2009-05-12
Posted By: STUDY-IT-ONLINE
Listed under these Business Listing Categories: Training and Education, IT Services & Products,

More Company News

 
 
 
livingstone-tourism-academycustom-graphicsBusiness Profilesmike-scholtz-electricalBubble-Chairs
 
   
 
 
 
  Accomodation
Accommodation


Online Foreign Exchange
Foreign Exchange


Directory
Directory


Fax
Fax 2 Email


Finance
Finance


Furniture
Furniture


Casino
Online Casino


Restaurant
Restaurant


Auctions
Shop Online


Study IT
Study IT Online


Web design
Web Design


Weddings
Weddings


Work
Work from Home
 
 
 
 
 
Company News
 
 

 

© 2017 www.wcbn.co.za. All rights reserved.

Daily Newsletter Subscription

 

Subscribe to the Western Cape Business News Daily News and information email (it's free).

Thank You
Your email address has been added.

Name:
Email Address: