Career Academy: EC-Council CHFI Computer Hacking
Forensic Investigator Training (Version 8)
English | .FLV | 10.4 GB| Author: Robert Reed | 22 Modules | Released: 2012
Forensic Investigator Training (Version 8)
English | .FLV | 10.4 GB| Author: Robert Reed | 22 Modules | Released: 2012
ESP: Informática forense investigación de piratería informática, es el proceso de detección de ataques de hackers, extrae correctamente las pruebas para denunciar el delito y llevar a cabo auditorías para prevenir futuros ataques. Informática forense es simplemente la aplicación de las técnicas de investigación informática y el análisis de los intereses de determinar evidencia legal potencial. La evidencia puede ser buscado en una amplia gama de delitos informáticos o mal uso, incluyendo pero no limitado a robo de secretos comerciales, robo o destrucción de la propiedad intelectual y fraude. CHFI investigadores pueden recurrir a una serie de métodos para el descubrimiento de datos que residen en un sistema informático, o la recuperación de borrado, la información del archivo encriptado, o dañados. Este curso te prepara para pasar el examen EC0 312-49 y conseguir Computer Forensics Investigador Hacking (CHFI) la certificación.
ENG: Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. This course will prepare you to pass the EC0 312-49 exam and achieve Computer Hacking Forensics Investigator (CHFI) certification.
Course Outline:
- Course Introduction
- Module 00 – Student Introduction
- Module 01 – Computer Forensics in Today’s World
- Module 02 – Computer Forensics Investigation Process
- Module 03 – Searching and Seizing Computers
- Module 04 – Digital Evidence
- Module 05 – First Responder Procedures
- Module 06 – Computer Forensics Lab
- Module 07 – Understanding Hard Disks and File Systems
- Module 08 – Windows Forensics
- Module 09 – Data Acquisition and Duplication
- Module 10 – Recovering Deleted Files and Deleted Partition
- Module 11 – Forensics Investigation Using AccessData FTK
- Module 12 – Forensics Investigation Using EnCase
- Module 13 – Steganography and Image File Forensics
- Module 14 – Application Password Crackers
- Module 15 – Log Capturing and Event Correlation
- Module 16 – Network Forensics, Investigating Logs and Investigating Network Traffic
- Module 17 – Investigating Wireless Attacks
- Module 18 – Investigating Web Attacks
- Module 19 – Tracking Emails and Investigating Email Crimes
- Module 20 – Mobile Forensics
- Module 21 – Investigative Reports
- Module 22 – Becoming an Expert Witness