0% found this document useful (0 votes)
153 views2 pages

Course Description Silabus Chfi

This document describes a course on computer hacking forensic investigation and mobile device forensics. The course will teach students how to detect hacking attacks and extract evidence from computer systems and mobile devices like phones and tablets. It will cover topics like the forensic investigation process, using forensic software, recovering deleted data, and analyzing data from various mobile operating systems and apps. The goal is for students to learn skills in acquiring, analyzing, and reporting data found on smartphones, tablets, and other mobile devices through hands-on practice with forensic tools and techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
153 views2 pages

Course Description Silabus Chfi

This document describes a course on computer hacking forensic investigation and mobile device forensics. The course will teach students how to detect hacking attacks and extract evidence from computer systems and mobile devices like phones and tablets. It will cover topics like the forensic investigation process, using forensic software, recovering deleted data, and analyzing data from various mobile operating systems and apps. The goal is for students to learn skills in acquiring, analyzing, and reporting data found on smartphones, tablets, and other mobile devices through hands-on practice with forensic tools and techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Computer Hacking Forensic

Investigator
MOBILE
FORENSICS
Instructor : Endang
Kurniawan,
M.M., CEH., CHFI., CIPM.
Email : [email protected]

COURSE DESCRIPTION:
Computer hacking forensic investigation is the process of
detecting hacking attacks and properly extracting evidence
to report the crime and conduct audits to prevent future
attacks. Computer forensics is simply the application of
computer investigation and analysis techniques in the
interests of determining potential legal evidence. Evidence
might be sought in a wide range of computer crime or
misuse, including but not limited to theft of trade secrets,
theft of or destruction of intellectual property, and fraud.
CHFI investigators can draw on an array of methods for
discovering data that resides in a computer system, or
recovering deleted, encrypted, or damaged file information.
Cell phones and mobile devices present a specific set of
challenges to forensic investigations. The forensics of a
mobile device is a highly specialized area requiring a
knowledge of proprietary operating systems, differing
firmware
implementations,
changing
network
communication protocols, and changing data storage
methods.
Mobile device forensics requires first-hand knowledge and
skills beyond the basic digital forensic training methods. In
accordance with our Decision Based Forensics process and
methodology, we utilize specialized forensic tools to extract,
analyze, record and report data found on cell phones and
other mobile devices.
By employing the right tools and procedures our forensic
examiners are likely to succeed in recovering lost and
deleted information from Smart Phones, Tablets, cell phones,
and other mobile devices. In the event that a case involves a
seriously damaged device, certain forensic methods can be
used to procure a solution.
COURSE TOPICS (tentative, subject to change):
1. Computer Forensics in Today's World
2. Computer Forensics Investigation Process
3. Forensics Investigation Using AccessData FTK.
4. Mobile Forensics
a. Mobile Device Data Recovery
b. Cell Phone Extraction Report

Computer Hacking Forensic


Investigator
MOBILE
FORENSICS
c. Mobile Device
Forensic
Analysis

COURSE OBJECTIVES:
The objectives are the goals of the course. They are the
intended results or consequences of instruction, curricula, or
activities. Once the course is completed the students will be
able to :
1. Acquire a variety of smartphone devices
2. Walk through mobile device file systems and identify data
3. Acquire Android devices
4. Acquire BlackBerry devices
5. Complete comprehensive data analysis on data associated
with the above devices as well as a large variety of other
devices
6. Practice proper analysis techniques for data associated
with popular apps
COURSE STUDENT LEARNING OUTCOMES :
This course provides basic to intermediate skills in mobile
phone forensics. Topics include the seizure and handling of
devices, forensic challenges, mobile device components,
standard operating procedures and introduces practical skills in
using forensic software and hardware. Participants are assessed
on their ability to perform logical and physical extractions and
find evidence on devices. Throughout the course the topics are
mapped onto the techniques used to solve a real-life criminal
investigation.
========================End Of
File==========================

You might also like