0% found this document useful (0 votes)
186 views

Introduction PDF

Uploaded by

Tomasz Łakomy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
186 views

Introduction PDF

Uploaded by

Tomasz Łakomy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Computer Hacking

Forensic Investigator
(CHFI)

Introduction
Introductions

~ Name

~ Company Affiliation

~ Title / Function

~ Job Responsibility

~ System security related experience

~Expectations

EC-Council
Course Materials

~ Identity Card
~ Student Courseware
~ Lab Manual/Workbook
~ CHFI Lab Files
~ Knoppix CD-ROM
~ Course Evaluation
~ Reference Materials

EC-Council
Course Outline

~ Module I: Computer Forensics in Today’s World


~ Module II: Law And Computer Forensics
~ Module III: Computer Investigation Process
~ Module IV: Computer Security Incident Response
Team
~ Module V: Computer Forensic Laboratory
Requirements
~ Module VI: Understanding File systems and Hard
disks
~ Module VII: Windows Forensics

EC-Council
Course Outline (contd.)

~ Module VIII: Linux and Macintosh Boot processes


~ Module IX: Linux Forensics
~ Module XX: Data Acquisition and Duplication
~ Module XI: Recovering Deleted Files
~ Module XII: Image Files Forensics
~ Module XIII: Steganography
~ Module XIV: Computer Forensic Tools

EC-Council
Course Outline (contd.)

~ Module XV: Application password crackers


~ Module XVI: Investigating Logs
~ Module XVII: Investigating network traffic
~ Module XVIII: Router Forensics
~ Module XIX: Investigating Web Attacks
~ Module XX: Tracking E-mails and Investigating E-
mail crimes

EC-Council
Course Outline (contd.)

~ Module XXI: Mobile and PDA Forensics


~ Module XXII: Investigating Trademark and
Copyright Infringement
~ Module XXIII: Investigative Reports
~ Module XIV: Becoming an Expert Witness
~ Module XXV: Forensics in action

EC-Council
EC-Council Certified e- business
Certification Program
There are several levels of certification tracks under EC-Council Accreditation
body:
1. Certified e-Business Associate

2. Certified e-Business Professional

3. Certified e-Business Consultant

4. E++ Certified Technical Consultant

5. Certified Ethical Hacker (CEH)

6. Computer Hacking Forensic Investigator (CHFI) Å You are here

7. EC-Council Certified Security Analyst (ECSA)

8. EC-Council Certified Secure Programmer (ECSA)

9. Certified Secure Application Developer (CSAD)

10. Licensed Penetration Tester (LPT)

11. Master of Security Science (MSS)

EC-Council
EC-Council CHFI Exam

EC-Council
Student Facilities

Class Hours

Building Hours Phones

Parking Messages

Restrooms Smoking

Meals Recycling

EC-Council
Lab Sessions

~ Lab Sessions are designed


to reinforce the classroom
sessions
~ The sessions are intended
to give a hands on
experience only and does
not guarantee proficiency.

EC-Council

You might also like