Jump to content


WELCOME TO CERTKNOWLEDGE

Skype : certknowledge

 

CCIE R&S SP SECURITY DATACENTER COLLABORATION WIRELESS
Written PASS PASS PASS PASS PASS NOT STABLE 
Lab PASS PASS PASS NOT STABLE PASS PASS

 

Last Updated : November 21st 2018


Content Spy


OFFER

Career Academy - Computer Hacking and Forensic Investigator Training CBT Boot Camp



2 replies to this topic

#1 Guests

  • Guests
  • thanks

Posted 17 September 2012 - 04:03 PM

Career Academy - Computer Hacking and Forensic Investigator Training CBT Boot Camp

Posted Image

Career Academy - Computer Hacking and Forensic Investigator Training CBT Boot Camp
English | 6 DVD | 12.16 GB
Genre: eLearning


Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. This course will prepare you to pass the EC0 312-49 exam and achieve Computer Hacking Forensics Investigator (CHFI) certification.



Course Outline

Course Introduction
Module 01 - Computer Forensics in Today�s World
Computer Forensics in Today�s World
Scenario
Demo - Introduction to IAAC Website
Forensic Science
Computer Forensics
Security Incident Report
Demo - Security Research Studies
Aspects of Organizational Security
Evolution of Computer Forensics
objectives of Computer Forensics
Need for Computer Forensics
Benefits of Forensic Readiness
Goals of Forensic Readiness
Forensic Readiness Planning
Cyber Crime
Computer Facilitated Crimes
Modes of Attack
Examples of Cyber Crime
Types of Computer Crimes
How Serious Were Different Types of Incidents
Time Spent Responding to the Security Incident
Cyber Crime Investigation
Key Steps in Forensic Investigation
Demo - Crime Scene Processing
Rules of Forensic Investigation
Need for Forensic Investigation
Role of Forensics Investigation
Accessing Computer Forensic Resources
Role of Digital Evidence
Understanding Corporate Investigations
Approach to Forensic Investigation: A Case Study
When an Advocate Contacts the Forensic Investigator, He Specifies How to Approach the Crime Scene
Where and When Do You Use Computer Forensics
Enterprise Theory of Investigation (ETI)
Demo - FBI ETI Model
Legal Issues
Reporting the Results
Module 01 - Review
Module 02 - Computer Forensics Investigation Process
Computer Forensics Investigation Process
Investigating Computer Crime
Before the Investigation
Build a Forensics Workstation
Building Investigation Team
People Involved in Computer Forensics
Review Policies and Laws
Demo - CyberCrime.gov Website Review
Demo - Extra Cyber Crime Resources
Forensics Laws
Notify Decision Makers and Acquire Authorization
Demo - Legal Resources
Risk Assessment
Build a Computer Investigation Toolkit
Demo - Forensics Toolkit of Documentation
Computer Forensics Investigation Methodology
Demo - DOJ Forensics Flow Chart
Steps to Prepare for a Computer Forensic Investigation
Obtain a Search Warrant
Searches Without a Warrant
Evaluate and Secure the Scene
Forensic Photography
Gather the Preliminary Information at Scene
First Responder
Demo - First Responder Guides
Collect the Evidence
Collect Physical Evidence
Evidence Collection Form
Collect Electronic Evidence
Guidelines in Acquiring Evidence
Secure the Evidence
Evidence Management
Chain of Custody
Chain of Custody Form
Demo - Chain of Custody
Original Evidence
Duplicate the Data (Imaging)
Verify Image Integrity
Recover Lost or Deleted Data
Analyze the Data
Data Analysis
Data Analysis Tools
Assess Evidence and Case
Evidence Assessment
Case Assessment
Processing Location Assessment
Best Practices
Prepare the Final Report
Documentation in Each Phase
Gather and Organize Information
Writing the Investigation Report
Demo - Forensics Report Example
Testify in Court as an Expert Witness
Demo - Extra Reading "A Hypothesis-Based Approach to Digital Forensic Investigations"
Expert Witness
Testifying in the Court Room
Closing the Case
Maintaining Professional Conduct
Investigating a Company Policy Violation
Computer Forensics Service Providers
Module 02 - Review
....Download


Hidden Content
You'll be able to see the hidden content once you press the thanks button.



Thanked by 6 Members:
seqchen , ISecure , maksimk , hurryken , billyc123 , uroboros

#2 OFFLINE   momok

momok

    Newbie

  • Users
  • 1 posts
  • 0 thanks

Posted 23 September 2012 - 03:45 AM

premium download only?? how about free user? mate

#3 Guest_ISecure_*

Guest_ISecure_*
  • Guests
  • thanks

Posted 19 October 2012 - 04:30 PM

its outdated now v8 is latest bro




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Organization

Community

Downloads

Test Providers

Site Info


Go to top