EC-Council: Certified Hacking Forensics Investigator
Designed to enhance cybersecurity professionals’ skills, this program prepares them to effectively investigate digital crimes and ensure their organizations are well-prepared for forensic challenges.
- Training Duration:
- 5 Days
- Delivery:
- Online & Face to Face
Core Roles:
- Digital Forensics Analyst
- Computer Forensic Analyst/Practitioner/Examiner/Specialist/Technician/Criminal Investigator/Lab Project Manager
- Cybercrime Investigator
- Computer Crime Investigator
- Cyber Defense Forensics Analyst
- Law Enforcement/Counterintelligence Forensics Analyst
- Data Forensic Investigator
- Digital Crime Specialist
- Computer Security Forensic Investigator
- Network/Technology Forensic Analyst/Specialist
- Digital Forensics and Incident Response Engineer
- Forensic Imaging Specialist
- Forensics and eDiscovery Analyst
- Computer Forensics and Intrusion Analyst
- Intrusions Forensics Lead
Specialized Roles:
- Security Engineer – Forensics
- Malware Analyst
- Mobile Forensic Analyst/Expert
- Mobile Exploitation Analyst
- Information Systems Security Professional/Analyst
- Information Technology Auditor
- Cryptanalyst
- Cryptographer
- Disaster Recovery Expert
- Intelligence Technology Analyst
- Cybersecurity Incident Response and Attack Analyst
- Cloud Security Analyst
- Forensics SME
- Forensic Accountant
- IT Security Forensic Analyst
- Cybersecurity/Defense Forensics Analyst
- Computer Forensics Foundations: Master the fundamentals of computer forensics, including cybercrime types, investigation procedures, and relevant regulations and standards.
- Malware Analysis: Gain expertise in malware analysis techniques, static and dynamic analysis, system and network behavior analysis, and ransomware investigation.
- Web Application Forensics: Understand web application threats, analyze web server logs (IIS, Apache), and investigate various web application attacks.
- Tor Browser Forensics: Learn the intricacies of Tor browser forensics, including its working methodology and the steps involved in its investigation.
- Cloud Forensics: Acquire in-depth knowledge of cloud computing concepts, cloud forensics challenges, and the investigation processes for major cloud providers (AWS, Azure, Google Cloud).
- Data Acquisition and E-Discovery: Master data acquisition techniques, eDiscovery processes, and the preparation of image files for forensic analysis.
- Anti-Forensics Countermeasures: Learn to detect and counteract various anti-forensics techniques used by attackers.
- Volatile and Non-Volatile Data Acquisition: Acquire volatile and non-volatile data in Windows, Linux, and Mac operating systems.
- Windows Forensics: Analyze Windows memory, registry, files (ShellBags, LNK, Jump Lists), event logs, and web browser data.
- Linux and Mac Forensics: Acquire volatile and non-volatile data and perform memory forensics in Linux and Mac operating systems.
- Network Forensics: Understand network forensics fundamentals, event correlation, Indicators of Compromise (IOCs), network traffic investigation techniques, incident detection and examination, and wireless attack detection.
- Mobile Device Forensics: Learn about the architecture, boot processes, and data acquisition methods for Android and iOS devices, including SIM file system analysis.
- IoT Forensics: Understand IoT threats, security problems, vulnerabilities, attack surfaces, and the challenges and processes involved in IoT forensics.
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Windows Forensics
- Linux and Mac Forensics
- Network Forensics
- Malware Forensics
- Investigating Web Attacks
- Dark Web Forensics
- Cloud Forensics
- Email and Social Media Forensics
- Mobile Forensics
- IoT Forensics
IT and forensics professionals with foundational knowledge in cybersecurity, computer forensics, incident response, and threat analysis.
Share this course to someone
Facebook
Twitter
LinkedIn
WhatsApp
Email
Print