• Like
File000113
Upcoming SlideShare
Loading in...5
×

File000113

  • 167 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
167
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
4
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Module 00 – Student Introduction
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Introduction Name Company Affiliation Title /Function Job Responsibility System security related experience Expectations
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Course Material 1. Identity Card 2. Student Courseware 3. Lab Manual/ Workbook 4. DVD ROM 5. Course Evaluation 6. Reference Material
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Course Outline 1. Computer Forensics in Today’s World 2. Computer Forensics Investigation Process 3. Searching and Seizing of Computers 4. Digital Evidence 5. First Responder Procedures 6. Incident Handling 7. Computer Forensics Lab 8. Understanding Hard Disks and File Systems 9. Digital Media Devices 10. CD/DVD Forensics 11. Windows Linux Macintosh Boot Process 12. Windows Forensics I 13. Windows Forensics II 14. Linux Forensics
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Course Outline (cont’d) 15. Mac Forensics 16. Data Acquisition and Duplication 17. Recovering Deleted Files and Deleted Partitions 18. Forensics Investigations Using AccessData FTK 19. Forensics Investigations Using Encase 20. Steganography 21. Image Files Forensics 22. Audio File Forensics 23. Video File Forensics 24. Application Password Crackers 25. Log Capturing and Event Correlation 26. Network Forensics and Investigating Logs
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Course Outline (cont’d) 27. Investigating Network Traffic 28. Router Forensics 29. Investigating Wireless Attacks 30. Investigating Web Attacks 31. Investigating DoS Attacks 32. Investigating Virus, Trojan, Spyware and Rootkit Attacks 33. Investigating Internet Crimes 34. Tracking Emails and Investigating Email Crimes 35. PDA Forensics 36. Blackberry Forensics 37. iPod and iPhone Forensics 38. CellPhone Forensics
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Course Outline (cont’d) 39. USB Forensics 40. Printer Forensics 41. Investigating Corporate Espionage 42. Investigating Computer Data Breaches 43. Investigating Trademark and Copyright Infringement 44. Investigating Sexual Harassment Incidents 45. Investigating Child Pornography Cases 46. Investigating Identity Theft Cases 47. Investigating Defamation over Websites and Blog Postings 48. Investigating Social Networking Websites for Evidences
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Course Outline (cont’d) 49. Investigating Search Keywords 50. Investigative Reports 51. Becoming an Expert Witness 52. How to Become a Digital Detective 53. Computer Forensics for Lawyers 54. Law and Computer Forensics 55. Computer Forensics and Legal Compliance 56. Security Policies 57. Risk Assessment 58. Evaluation and Certification of Information Systems 59. Ethics in Computer Forensics 60: Computer Forensic Tools
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Course Outline (cont’d) 61. Windows Based Command Line Tools 62. Windows Based GUI Tools 63. Forensics Frameworks 64. Forensics Investigation Templates 65. Computer Forensics Consulting Companies
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited EC-Council Certified Computer Hacking Forensic Investigator
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Student Facilities Class Hours Building Hours Parking Restroom Meals Phones Messages Smoking Recycling
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Lab Sessions Lab sessions are designed to reinforce the classroom sessions The sessions are intended to give a hands on experience only and does not guarantee proficiency
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited CHFI Class Speed The CHFI is extremely fast paced The class speed can be compared to the climax scene form the movie Mission Impossible (Bullet train sequence) There are tons of Forensics tools and forensics technology covered in the curriculum The instructor WILL NOT be able to demonstrate ALL the tools in this class He/ she will showcase only Selected tools The students are required to practice with the tools not demonstrated in the class on their own
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Self Study Modules Modules 22,23,39,40, 42,46, 47-49, 52 - 65 are marked as self study modules Students are required to study these modules on their own Your instructor will provide details of additional modules marked for self study (if any)