SlideShare a Scribd company logo
1 of 14
Download to read offline
Computer Hacking Forensic Investigator
CRAW Security
CRAW Security
Course Description
Computer Hacking Forensic Investigator (CHFI) Training will provides Understand the
concept of forensic science, cyber crime, and steps in forensic investigation Learn the
laws involved and work accordingly to search and seize the computers with a warrant
List roles of first Responder, evaluate electronic crime scene, conduct preliminary
interviews; collect, preserve and transport electronic evidence along with complete
documentation Define different types of digital evidence, rules of evidence, digital
evidence examination process, and electronic crime and digital evidence consideration
by crime category Setting computer forensics lab Retrieve existing and deleted files
from different operation systems using different processes such as Access Data FTK,
Encase, Stenography and other techniques Crack system and application passwords
Perform log capturing to establish event correlation Investigate network traffic, emails,
and attacks Practice forensic process on mobile devices with different operating
systems.
CRAW Security
Target to Audience
Individuals
 School Students
 College Students
 IT Professionals
 IT Officers
 IT and LAW Officers
Corporates
 IT Training Firms
 IT Consultants
 IT Experts
 IT Officers
 IT Institutions & Colleges
 IT Graduated or Computer Science
Students
CRAW Security
Duration of Program
 1 Month (2 Hours per Day )
 15 Days (4 Hours per Day)
 8 Days (5-6 Hours per Day)
 5 Days (8 Hours per Day)
CRAW Security
Certification
The CHFI 312-49 exam will be conducted on the last day of training. Students need to
pass the online Parametric exam to receive the CHFI certification.
CRAW Security
Exam Details
CRAW Security
 Number of Questions: 150
 Passing Score: 70%
 Test Duration: 4 hours
 Test Format: MCQ
 Test Delivery: ECC exam portal
What we try to Give
We try to give you real industry standards with best possible quality to all our
customers and clients. We focus on Various sections of Society and running a national
level campaign to literate Students from all parts of company who can’t Afford “Basic
IT Computer Training”. We wish we could teach as many students from all over the
world and make it a beautiful place to work. We work on minimum gross margins to
strength the Indian It infrastructure.
CRAW Security
CHFI Recognition/
Endorsement/Mapping
CRAW Security
What is New in the CHFI
Course
 14 comprehensive modules and 39 Labs.
 More than 40 percent of new labs.
 More than 400 new/updated tools
 Classroom friendly curriculum with diagrammatic representation of
concepts and examples.
 New and rich presentation style with eye catching graphics
 Coverage of latest operating systems
 Updated patch management and testing environment
 Well tested, result oriented, descriptive and analytical lab manual to evaluate the
presented concepts.
CRAW Security
Course Outline of CHFI
CRAW Security
 Computer Forensics in Today’s World
 Computer Forensics Investigation Process
 Understanding Hard Disks and File Systems
 Operating System Forensics
 Defeating Anti-Forensics Techniques
 Data Acquisition and Duplication
 Network Forensics
 Investigating Web Attacks
 Database Forensics
 Cloud Forensics
 Malware Forensics
 Investigating Email Crimes
 Mobile Forensics
 Investigative Reports
Prerequisites
IT/forensics professionals with basic knowledge on IT/cyber security, Computer
Forensics, and incident response Prior completion of CEH training would be an
advantage.
CRAW Security
 Anyone interested in cyber forensics/investigations Attorneys, legal consultants,
and lawyers.
 Law enforcement officers
 Police officers
 Federal/ government agents
 Defence and military
 Detectives/ investigators
 Incident response team members
 Information security managers
 Network defenders
 IT professionals, IT directors/managers
 System/network engineers
 Security analyst/ architect/ auditors/ consultants
CRAW Security
Who should attend
Contact Us
CRAW Security
1st Floor, Kehar Singh Estate, Plot no. 4, Lane no. 2, Saidulajab,
Saket Metro Station, New Delhi- 110030
Call Us
011-40394315 | +91-9650202445 | +91-9650677445
Mails Us
training@craw.in
Visit Us
www.crawsecurity.com | www.craw.in
CRAW Security
CRAW Security
THANK YOU
IT HAS BEEN A PLEASURE!

More Related Content

What's hot

Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing ServicesCyber 51 LLC
 
ARM 7: ThaiCERT Operations and Priorities
ARM 7: ThaiCERT Operations and PrioritiesARM 7: ThaiCERT Operations and Priorities
ARM 7: ThaiCERT Operations and PrioritiesAPNIC
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical HackerKnowledgehut
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jainAnkita Jain
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
Anomaly Detection for Security
Anomaly Detection for SecurityAnomaly Detection for Security
Anomaly Detection for SecurityCody Rioux
 
Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochureHBServices7
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testingMohit Belwal
 
Extended summary of "A different cup of TI? The added value of commercial thr...
Extended summary of "A different cup of TI? The added value of commercial thr...Extended summary of "A different cup of TI? The added value of commercial thr...
Extended summary of "A different cup of TI? The added value of commercial thr...AlessandraAmato4
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceSparkCognition
 
Cognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureCognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureSparkCognition
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 

What's hot (19)

Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing Services
 
Ochedikwu onche cv
Ochedikwu onche cvOchedikwu onche cv
Ochedikwu onche cv
 
ARM 7: ThaiCERT Operations and Priorities
ARM 7: ThaiCERT Operations and PrioritiesARM 7: ThaiCERT Operations and Priorities
ARM 7: ThaiCERT Operations and Priorities
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
Anomaly Detection for Security
Anomaly Detection for SecurityAnomaly Detection for Security
Anomaly Detection for Security
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochure
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
Extended summary of "A different cup of TI? The added value of commercial thr...
Extended summary of "A different cup of TI? The added value of commercial thr...Extended summary of "A different cup of TI? The added value of commercial thr...
Extended summary of "A different cup of TI? The added value of commercial thr...
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
 
Cognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureCognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecure
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 

Similar to Computer Hacking Forensic Investigator Course Details and Course Brochure | EC-Council

Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfamallblitz0
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academytrashbin306
 
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"sharinblitz
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingMehedi Hasan
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI CertificationSagarNegi10
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsSanket Shikhar
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council EC-Council
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Dr. Idris Ahmed
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiCRAW CYBER SECURITY PVT LTD
 
Become a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near MeBecome a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near Meshyamv3005
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guideaqazad
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
 

Similar to Computer Hacking Forensic Investigator Course Details and Course Brochure | EC-Council (20)

Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academy
 
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI Certification
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applications
 
Ecsa Course
Ecsa CourseEcsa Course
Ecsa Course
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council
 
Ecsa
EcsaEcsa
Ecsa
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
 
Become a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near MeBecome a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near Me
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 

More from CRAW CYBER SECURITY PVT LTD

Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiCRAW CYBER SECURITY PVT LTD
 
CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCRAW CYBER SECURITY PVT LTD
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCRAW CYBER SECURITY PVT LTD
 

More from CRAW CYBER SECURITY PVT LTD (6)

Oracle summer internship training in Delhi
Oracle summer internship training in DelhiOracle summer internship training in Delhi
Oracle summer internship training in Delhi
 
Android Development Summer Internship in Delhi
Android Development Summer Internship in DelhiAndroid Development Summer Internship in Delhi
Android Development Summer Internship in Delhi
 
Advanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in DelhiAdvanced Ethical hacking summer Internship in Delhi
Advanced Ethical hacking summer Internship in Delhi
 
CompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltailsCompTIA Security+ Training and Certification in deltails
CompTIA Security+ Training and Certification in deltails
 
CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training details
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Computer Hacking Forensic Investigator Course Details and Course Brochure | EC-Council

  • 1. Computer Hacking Forensic Investigator CRAW Security CRAW Security
  • 2. Course Description Computer Hacking Forensic Investigator (CHFI) Training will provides Understand the concept of forensic science, cyber crime, and steps in forensic investigation Learn the laws involved and work accordingly to search and seize the computers with a warrant List roles of first Responder, evaluate electronic crime scene, conduct preliminary interviews; collect, preserve and transport electronic evidence along with complete documentation Define different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category Setting computer forensics lab Retrieve existing and deleted files from different operation systems using different processes such as Access Data FTK, Encase, Stenography and other techniques Crack system and application passwords Perform log capturing to establish event correlation Investigate network traffic, emails, and attacks Practice forensic process on mobile devices with different operating systems. CRAW Security
  • 3. Target to Audience Individuals  School Students  College Students  IT Professionals  IT Officers  IT and LAW Officers Corporates  IT Training Firms  IT Consultants  IT Experts  IT Officers  IT Institutions & Colleges  IT Graduated or Computer Science Students CRAW Security
  • 4. Duration of Program  1 Month (2 Hours per Day )  15 Days (4 Hours per Day)  8 Days (5-6 Hours per Day)  5 Days (8 Hours per Day) CRAW Security
  • 5. Certification The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Parametric exam to receive the CHFI certification. CRAW Security
  • 6. Exam Details CRAW Security  Number of Questions: 150  Passing Score: 70%  Test Duration: 4 hours  Test Format: MCQ  Test Delivery: ECC exam portal
  • 7. What we try to Give We try to give you real industry standards with best possible quality to all our customers and clients. We focus on Various sections of Society and running a national level campaign to literate Students from all parts of company who can’t Afford “Basic IT Computer Training”. We wish we could teach as many students from all over the world and make it a beautiful place to work. We work on minimum gross margins to strength the Indian It infrastructure. CRAW Security
  • 9. What is New in the CHFI Course  14 comprehensive modules and 39 Labs.  More than 40 percent of new labs.  More than 400 new/updated tools  Classroom friendly curriculum with diagrammatic representation of concepts and examples.  New and rich presentation style with eye catching graphics  Coverage of latest operating systems  Updated patch management and testing environment  Well tested, result oriented, descriptive and analytical lab manual to evaluate the presented concepts. CRAW Security
  • 10. Course Outline of CHFI CRAW Security  Computer Forensics in Today’s World  Computer Forensics Investigation Process  Understanding Hard Disks and File Systems  Operating System Forensics  Defeating Anti-Forensics Techniques  Data Acquisition and Duplication  Network Forensics  Investigating Web Attacks  Database Forensics  Cloud Forensics  Malware Forensics  Investigating Email Crimes  Mobile Forensics  Investigative Reports
  • 11. Prerequisites IT/forensics professionals with basic knowledge on IT/cyber security, Computer Forensics, and incident response Prior completion of CEH training would be an advantage. CRAW Security
  • 12.  Anyone interested in cyber forensics/investigations Attorneys, legal consultants, and lawyers.  Law enforcement officers  Police officers  Federal/ government agents  Defence and military  Detectives/ investigators  Incident response team members  Information security managers  Network defenders  IT professionals, IT directors/managers  System/network engineers  Security analyst/ architect/ auditors/ consultants CRAW Security Who should attend
  • 13. Contact Us CRAW Security 1st Floor, Kehar Singh Estate, Plot no. 4, Lane no. 2, Saidulajab, Saket Metro Station, New Delhi- 110030 Call Us 011-40394315 | +91-9650202445 | +91-9650677445 Mails Us training@craw.in Visit Us www.crawsecurity.com | www.craw.in CRAW Security
  • 14. CRAW Security THANK YOU IT HAS BEEN A PLEASURE!