As recent high-profile security breaches have demonstrated, network security is a top priority for modern businesses. Not only is it crucial to prevent cyber-attacks and efficiently restore normal service when they do happen, it is also vital to locate the source of the attack and work out exactly what happened. This course is designed to enable professionals to do just that.
This online training provides certification in the specific security discipline of computer forensics from a vendor-neutral perspective. E-Careers is the only educational institute in the UK or Ireland where you can undertake this EC-Council accredited course. To find out more please visit the EC-Council website.
Developed by an experienced panel of industry experts, this EC-Council certification represents the global gold standard for computer forensics best practice and is the perfect choice for professionals who require expertise in network infrastructure.
Who Is It For?
The CHFI programme is designed for all professionals who are involved in information system security, computer forensics and incident response. The training is particularly useful to individuals working in law enforcement agencies including the police, defence and military, eBusiness security, system administration, law, banking, insurance, government agencies and IT management.
Why Should I Enrol?
With cyber-crime outstripping physical crime in the UK, there is a huge demand for CHFI-certified professionals with expertise in the domains of digital forensics. Cyber security professionals who gain a firm grasp of digital forensics are on the fast track to becoming indispensable members of incident handling and incident response teams. Not only will completing the programme boost your career prospects, it will be achievable in your own time as you get a full 12 months to complete the course and exam after you sign up.
There is a firm emphasis on hands-on learning with the cloud-based virtual labs, iLabs, with approximately 50% of learning time devoted to labs. What’s more, the labs cover all relevant knowledge-bases and skills to meet regulatory compliance standards. The training boasts many new features including more than 40% new iLabs and over 400 new or updated tools. Not only that, you can expect a brand-new presentation style with eye-catching graphics, a classroom-friendly curriculum with diagrammatic representation of concepts and examples, updated patch management and testing environment, and a well-tested, result-oriented descriptive and analytical lab manual to evaluate the presented concepts. And with Windows, Mac, iPhone, iPad and Android compatibility, you are free to complete the training at your convenience on all your internet-enabled devices.
What Will I Learn?
CHFIv9 has a detailed and methodological approach to computer forensic and evidence analysis. It also provides the vital skillset needed to identify an intruder’s footprints and gather necessary evidence for prosecution, with all major tools and theories used in the cyber forensic industry being covered in the curriculum. There is a strong emphasis on the practical expertise needed to perform effective digital forensic investigation in a forensically sound, evidence-preserving way. The approach is procedural and covers searching and seizing, chain-of-custody, acquisition, preservation, analysis and the reporting of digital evidence. In the first unit of study you will explore computer forensics in today’s world and computer forensics investigation processes. From there you will gain an understanding of hard disks and file systems before progressing to operating system forensics. Next, you will learn about techniques to defeat anti-forensics before moving on to data acquisition and duplication. Network forensics and investigating web attacks are the next topics covered, followed by database forensics, cloud forensics and malware forensics. Finally, you will complete your learning with an in-depth look at investigating email crimes, mobile forensics and investigative reports.
What Will I Learn?
No formal qualifications are needed to undertake this course, however gaining the Certified Ethical Hacker (CEH) certification would be an advantage.
Get your career firmly on track as you learn to fight back against cyber-crime by signing up to Computer Hacking Forensic Investigator today.
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Operating System Forensics
- Defeating Anti-Forensics Techniques
- Data Acquisition and Duplication
- Network Forensics
- Investigating Web Attacks
- Database Forensics
- Cloud Forensics
- Malware Forensics
- Investigating Email Crimes
- Mobile Forensics
- Investigative Reports