SlideShare a Scribd company logo
1 of 8
Download to read offline
EC-Council Computer Hacking Forensic Investigator
1Page:
C HFIComputer Hacking Forensic
INVESTIGATOR
TM
v8
C HFIComputer Hacking Forensic
INVESTIGATOR
TM
v8
EC-Council
Computer Hacking Forensic Investigator
EC-Council Computer Hacking Forensic Investigator
2Page:
“Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting
edge skills in computer forensics”
“If you desire to acquire the knowledge or skill set to identify,
track and bring the cyber criminals to justice, then this
course is the right choice for you”
“CHFI, the most sought-
after information security
certification in the field
of Computer Forensic
Investigation. Designed to
reinforce the skills of the
new generation of cyber
sleuths.”
EC-Council Computer Hacking Forensic Investigator
01Page:
Course Description:
Target Audience:
The CHFI program is designed for all IT professionals involved with information system security, computer
forensics, and incident response.
Prerequisites
It is strongly recommended that you attend
the CEH class before enrolling into CHFI
program.
Duration
5 days (9:00 – 5:00)
Certification
The CHFI 312-49 exam will be conducted on the last day of training (optional). Students need to pass
the online Prometric exam to receive the CHFI certification.
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a
detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering
major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic
investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has
begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need
for advanced cyber security and investigation training is a mandate in the present day. If you or your organization
requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you.
This course helps students to excel in digital evidence acquisition,handling and analysis in a forensically sound
manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security
incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer
systems.
Exam Details
1.	 Number of Questions: 150
2.	 Passing Score: 70%
3.	 Test Duration: 4 Hours
4.	 Test Format: Multiple Choice
5.	 Test Delivery: Prometric Prime / Prometric APTC /
VUE
Exam Code
The exam code varies when taken at different testing
centers.
1.	 Prometric Prime: 312-49
2.	 Prometric APTC: EC0-349
3.	 VUE: 312-49
EC-Council Computer Hacking Forensic Investigator
02Page:
Key features of CHFI v8
Updated Content
CHFIv8 contains updated information including concepts, methodologies and tools.
Organized Content
The well-organized content enhances the learning experience and ensures better understanding of key
concepts and investigation methodologies.
Methodological Approach
CHFIv8 presents step-by-step procedures,best practices and guidelines to carry out forensic investigation.
Illustration Rich
Concepts are well-illustrated to create self-explanatory slides which makes it classroom and instructor
friendly.
New Investigation Techniques
CHFIv8 provides in-depth knowledge of new techniques and tools used in forensic investigation to meet
the toughest challenges in fighting cybercrime.
Investigation Tools
CHFIv8 showcases hundreds of investigation tools including EnCase, Access Data FTK, and
ProDiscover.
Sample Evidence Files
CHFIv8 DVD contains a huge cache of evidence files for analysis including RAW, .dd images, video and
audio files, MS Office files, systems files etc.
Visual Content Technology
Use of rich Visual Content Technology to present concepts and forensic investigation techniques.
Lab Setup
Lab setup manual provides detailed procedures to setup a lab environment complete with network
environment, evidence files and other prerequisite tools.
DVD-ROM Content
CHFIv8 also provides a DVD-ROM with a repository of the around 8 GB of the latest investigation and
security tools.
EC-Council Computer Hacking Forensic Investigator
03Page:
Version Comparison
Computer Hacking Forensic Investigator courseware has
undergone tremendous improvements compared to its previous
versions. We have invested 4 times the effort in fundamental
research and development since its last release, and have given
CHFIv8 a complete makeover. The new version is a breakaway
from earlier releases with more emphasis given on techniques and
methodologies, which helps in the development of an advanced
forensic analysis skill set. ‘A picture is worth a thousand words’
and we at EC-Council have enforced the saying by using addvance
Visual Content technology (VCT) to explain various forensic
investigation concepts. The comprehensive instructor slides
and student manual in CHFIv8 empowers the instructors with
flawless flow and outstanding diagrammatic representation of the
investigation techniques, which makes it easier to teach and enables
students to understand the concepts.
i Labs
The iLabs is a subscription based service that allows
students to log on to a virtualized remote machine
running Windows 2008 Server to perform various
exercises featured in the CHFIv8 Lab Guide. All
you need is a web browser to connect and start
experimenting. The virtual machine setup reduces the
time and effort spent by instructors and partners prior
to the classroom engagement. It is a hassle free service
available 24/7 x number of days subscribed.
Benefits
•	 Enables students to practice various investigation
techniques in a real time and simulated environment
•	 The course tools and programs are preloaded on the
iLabs machine thereby saving productive time and
effort
The CHFI Certification is
an incredible asset to my
company which has now a
better understanding of Security
issues, especially concerning
vulnerability.
“
“
- Frank Chow, CHFI,
Automated Systems (HK) Ltd,
China.
EC-Council Computer Hacking Forensic Investigator
04Page:
What will you learn?
Students going through CHFI
training will learn:
•	 The computer forensic
investigation process and the
various legal issues involved
•	 Evidence searching, seizing and
acquisition methodologies in
a legal and forensically sound
manner
•	 Different types of digital
evidence, rules of evidence,
digital evidence examination
process, and electronic crime and
digital evidence consideration by
crime category
•	 Roles of first responder, first
responder toolkit, securing and
evaluating electronic crime
scene, conducting preliminary
interviews, documenting
electronic crime scene, collecting
and preserving electronic
evidence, packaging and
transporting electronic evidence,
and reporting the crime scene
•	 How to set up a computer
forensics lab and the tools
involved in it
•	 Various file systems and how to
boot a disk
•	 Gathering volatile and non-
volatile information from
Windows
•	 Data acquisition and duplication
rules, validation methods and
tools required
•	 How to recover deleted files and
deleted partitions in Windows,
Mac OS X, and Linux
•	 The process involved in forensic
investigation using AccessData
FTK and EnCase
•	 Steganography and its
techniques, Steganalysis, and
image file forensics
•	 Password Cracking Concepts,
tools, types of password attacks
and how to investigate password
protected files
•	 Different types of log
capturing, log management,
time synchronization, and log
capturing tools
•	 How to investigate logs, network
traffic, wireless attacks, and web
attacks
•	 How to track e-mails and
investigate e-mail crimes
•	 Mobile forensics and mobile
forensics software and hardware
tools
•	 How to write investigative
reports
The course material is up to date and very
complete. It really takes you on a trip through
the Security field. Each chapter has lab exercises
and this makes you understand the stuff in the
book much better. If you are working or want
to work in the Information Security field this
training is highly recommended.
“
“
- Martin de Kok, Sr Security Officer,
Netherlands.
EC-Council Computer Hacking Forensic Investigator
05Page:
Course Outline Version 8
CHFIv8 curriculum consists of 22 instructor-led
training modules.
1.	 Computer Forensics in Today’s World
2.	 Computer Forensics Investigation Process
3.	 Searching and Seizing Computers
4.	 Digital Evidence
5.	 First Responder Procedures
6.	 Computer Forensics Lab
7.	 Understanding Hard Disks and File Systems
8.	 Windows Forensics
9.	 Data Acquisition and Duplication
10.	Recovering Deleted Files and Deleted Partitions
11.	Forensics Investigation Using AccessData FTK
12.	Forensics Investigation Using EnCase
13.	Steganography and Image File Forensics
14.	Application Password Crackers
15.	Log Capturing and Event Correlation
16.	Network Forensics, Investigating Logs and
Investigating Network Traffic
17.	Investigating Wireless Attacks
18.	Investigating Web Attacks
19.	Tracking Emails and Investigating Email Crimes
20.	Mobile Forensics
21.	Investigative Reports
22.	Becoming an Expert Witness
CHFI is a certification that gives a complete
overview of the process that a forensic
investigator must follow when investigating
a cybercrime. It includes not only the right
treatment of the digital evidence in order
to be accepted in the Courts but also useful
tools and techniques that can be applied to
investigate an incident.
“
“
- Virginia Aguilar, CHFI,
KPMG, Madrid.
EC-Council Computer Hacorensitor
06Page:
EC-Council
6330 Riverside Plaza Ln NW
Suite 210
Albuquerque, NM 87120
Tel: +1.505.341.3228
Fax: +1.505.341.0050
http://www.eccouncil.org
EC-Council

More Related Content

What's hot

Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsShanaAneevan
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Developmentamiable_indian
 
Ceh v8 labs module 00
Ceh v8 labs module 00Ceh v8 labs module 00
Ceh v8 labs module 00Asep Sopyan
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogNetCom Learning
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical HackerKnowledgehut
 
Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7FRSecure
 
B-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseB-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseStephan Chenette
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseInfosec
 
Ceh v8 labs module 09 social engineering
Ceh v8 labs module 09 social engineeringCeh v8 labs module 09 social engineering
Ceh v8 labs module 09 social engineeringAsep Sopyan
 
Comp tia network_n10-005
Comp tia network_n10-005Comp tia network_n10-005
Comp tia network_n10-005sunil kumar
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalJohn Dunne
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017FRSecure
 
K Ai
K AiK Ai
K AiCTIN
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?festival ICT 2016
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 

What's hot (20)

Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Ceh v8 labs module 00
Ceh v8 labs module 00Ceh v8 labs module 00
Ceh v8 labs module 00
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
File000117
File000117File000117
File000117
 
Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7Slide Deck CISSP Class Session 7
Slide Deck CISSP Class Session 7
 
B-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseB-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive Defense
 
File000163
File000163File000163
File000163
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
File000176
File000176File000176
File000176
 
Ceh v8 labs module 09 social engineering
Ceh v8 labs module 09 social engineeringCeh v8 labs module 09 social engineering
Ceh v8 labs module 09 social engineering
 
Comp tia network_n10-005
Comp tia network_n10-005Comp tia network_n10-005
Comp tia network_n10-005
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 Final
 
File000169
File000169File000169
File000169
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
 
K Ai
K AiK Ai
K Ai
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 

Viewers also liked

Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
 Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.  Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India. cnetworks
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45
 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsDenim Group
 
Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Denim Group
 
Source code review - Usman Khan
Source code review - Usman Khan Source code review - Usman Khan
Source code review - Usman Khan Usman Khan
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 
Eight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentEight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentSirius
 

Viewers also liked (20)

Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
 Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.  Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
Codec Networks is Present Training in Penetration testing,VAPT in Delhi,India.
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Study
 
persentation
persentationpersentation
persentation
 
ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Running a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source ToolsRunning a Software Security Program with Open Source Tools
Running a Software Security Program with Open Source Tools
 
Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)Running a Software Security Program with Open Source Tools (Course)
Running a Software Security Program with Open Source Tools (Course)
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
 
Source code review - Usman Khan
Source code review - Usman Khan Source code review - Usman Khan
Source code review - Usman Khan
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
File000132
File000132File000132
File000132
 
File000133
File000133File000133
File000133
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
File000120
File000120File000120
File000120
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
CHFI
CHFICHFI
CHFI
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Eight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability AssessmentEight Steps to an Effective Vulnerability Assessment
Eight Steps to an Effective Vulnerability Assessment
 

Similar to Codec Networks Offering Courses in Cyber forensic in Delhi,India.

EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council EC-Council
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...CRAW CYBER SECURITY PVT LTD
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI CertificationSagarNegi10
 
Getting started in digital forensics
Getting started in digital forensicsGetting started in digital forensics
Getting started in digital forensicsInfosec
 
Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochureHBServices7
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxbagotjesusa
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfisha bajpai
 
CEH Training in Gurgaon :SSDN Technologies
CEH Training in Gurgaon :SSDN TechnologiesCEH Training in Gurgaon :SSDN Technologies
CEH Training in Gurgaon :SSDN TechnologiesInformation Technology
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingBryan Len
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...Firojali Laskar
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfisha bajpai
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramITpreneurs
 

Similar to Codec Networks Offering Courses in Cyber forensic in Delhi,India. (20)

EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council Computer Hacking Forensic Investigator v9 | EC-Council
Computer Hacking Forensic Investigator v9 | EC-Council
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
 
CHFI Certification
CHFI CertificationCHFI Certification
CHFI Certification
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 
Getting started in digital forensics
Getting started in digital forensicsGetting started in digital forensics
Getting started in digital forensics
 
Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochure
 
Ce hv10 brochure
Ce hv10 brochureCe hv10 brochure
Ce hv10 brochure
 
Ce hv8 module 00
Ce hv8 module 00Ce hv8 module 00
Ce hv8 module 00
 
Security5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdf
 
CEH Training in Gurgaon :SSDN Technologies
CEH Training in Gurgaon :SSDN TechnologiesCEH Training in Gurgaon :SSDN Technologies
CEH Training in Gurgaon :SSDN Technologies
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
 
edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdf
 
EC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst ProgramEC-Council Certified Security Analyst Program
EC-Council Certified Security Analyst Program
 

Recently uploaded

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 

Recently uploaded (20)

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 

Codec Networks Offering Courses in Cyber forensic in Delhi,India.

  • 1. EC-Council Computer Hacking Forensic Investigator 1Page: C HFIComputer Hacking Forensic INVESTIGATOR TM v8 C HFIComputer Hacking Forensic INVESTIGATOR TM v8 EC-Council Computer Hacking Forensic Investigator
  • 2. EC-Council Computer Hacking Forensic Investigator 2Page: “Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer forensics” “If you desire to acquire the knowledge or skill set to identify, track and bring the cyber criminals to justice, then this course is the right choice for you” “CHFI, the most sought- after information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths.”
  • 3. EC-Council Computer Hacking Forensic Investigator 01Page: Course Description: Target Audience: The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response. Prerequisites It is strongly recommended that you attend the CEH class before enrolling into CHFI program. Duration 5 days (9:00 – 5:00) Certification The CHFI 312-49 exam will be conducted on the last day of training (optional). Students need to pass the online Prometric exam to receive the CHFI certification. EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition,handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems. Exam Details 1. Number of Questions: 150 2. Passing Score: 70% 3. Test Duration: 4 Hours 4. Test Format: Multiple Choice 5. Test Delivery: Prometric Prime / Prometric APTC / VUE Exam Code The exam code varies when taken at different testing centers. 1. Prometric Prime: 312-49 2. Prometric APTC: EC0-349 3. VUE: 312-49
  • 4. EC-Council Computer Hacking Forensic Investigator 02Page: Key features of CHFI v8 Updated Content CHFIv8 contains updated information including concepts, methodologies and tools. Organized Content The well-organized content enhances the learning experience and ensures better understanding of key concepts and investigation methodologies. Methodological Approach CHFIv8 presents step-by-step procedures,best practices and guidelines to carry out forensic investigation. Illustration Rich Concepts are well-illustrated to create self-explanatory slides which makes it classroom and instructor friendly. New Investigation Techniques CHFIv8 provides in-depth knowledge of new techniques and tools used in forensic investigation to meet the toughest challenges in fighting cybercrime. Investigation Tools CHFIv8 showcases hundreds of investigation tools including EnCase, Access Data FTK, and ProDiscover. Sample Evidence Files CHFIv8 DVD contains a huge cache of evidence files for analysis including RAW, .dd images, video and audio files, MS Office files, systems files etc. Visual Content Technology Use of rich Visual Content Technology to present concepts and forensic investigation techniques. Lab Setup Lab setup manual provides detailed procedures to setup a lab environment complete with network environment, evidence files and other prerequisite tools. DVD-ROM Content CHFIv8 also provides a DVD-ROM with a repository of the around 8 GB of the latest investigation and security tools.
  • 5. EC-Council Computer Hacking Forensic Investigator 03Page: Version Comparison Computer Hacking Forensic Investigator courseware has undergone tremendous improvements compared to its previous versions. We have invested 4 times the effort in fundamental research and development since its last release, and have given CHFIv8 a complete makeover. The new version is a breakaway from earlier releases with more emphasis given on techniques and methodologies, which helps in the development of an advanced forensic analysis skill set. ‘A picture is worth a thousand words’ and we at EC-Council have enforced the saying by using addvance Visual Content technology (VCT) to explain various forensic investigation concepts. The comprehensive instructor slides and student manual in CHFIv8 empowers the instructors with flawless flow and outstanding diagrammatic representation of the investigation techniques, which makes it easier to teach and enables students to understand the concepts. i Labs The iLabs is a subscription based service that allows students to log on to a virtualized remote machine running Windows 2008 Server to perform various exercises featured in the CHFIv8 Lab Guide. All you need is a web browser to connect and start experimenting. The virtual machine setup reduces the time and effort spent by instructors and partners prior to the classroom engagement. It is a hassle free service available 24/7 x number of days subscribed. Benefits • Enables students to practice various investigation techniques in a real time and simulated environment • The course tools and programs are preloaded on the iLabs machine thereby saving productive time and effort The CHFI Certification is an incredible asset to my company which has now a better understanding of Security issues, especially concerning vulnerability. “ “ - Frank Chow, CHFI, Automated Systems (HK) Ltd, China.
  • 6. EC-Council Computer Hacking Forensic Investigator 04Page: What will you learn? Students going through CHFI training will learn: • The computer forensic investigation process and the various legal issues involved • Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category • Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene • How to set up a computer forensics lab and the tools involved in it • Various file systems and how to boot a disk • Gathering volatile and non- volatile information from Windows • Data acquisition and duplication rules, validation methods and tools required • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux • The process involved in forensic investigation using AccessData FTK and EnCase • Steganography and its techniques, Steganalysis, and image file forensics • Password Cracking Concepts, tools, types of password attacks and how to investigate password protected files • Different types of log capturing, log management, time synchronization, and log capturing tools • How to investigate logs, network traffic, wireless attacks, and web attacks • How to track e-mails and investigate e-mail crimes • Mobile forensics and mobile forensics software and hardware tools • How to write investigative reports The course material is up to date and very complete. It really takes you on a trip through the Security field. Each chapter has lab exercises and this makes you understand the stuff in the book much better. If you are working or want to work in the Information Security field this training is highly recommended. “ “ - Martin de Kok, Sr Security Officer, Netherlands.
  • 7. EC-Council Computer Hacking Forensic Investigator 05Page: Course Outline Version 8 CHFIv8 curriculum consists of 22 instructor-led training modules. 1. Computer Forensics in Today’s World 2. Computer Forensics Investigation Process 3. Searching and Seizing Computers 4. Digital Evidence 5. First Responder Procedures 6. Computer Forensics Lab 7. Understanding Hard Disks and File Systems 8. Windows Forensics 9. Data Acquisition and Duplication 10. Recovering Deleted Files and Deleted Partitions 11. Forensics Investigation Using AccessData FTK 12. Forensics Investigation Using EnCase 13. Steganography and Image File Forensics 14. Application Password Crackers 15. Log Capturing and Event Correlation 16. Network Forensics, Investigating Logs and Investigating Network Traffic 17. Investigating Wireless Attacks 18. Investigating Web Attacks 19. Tracking Emails and Investigating Email Crimes 20. Mobile Forensics 21. Investigative Reports 22. Becoming an Expert Witness CHFI is a certification that gives a complete overview of the process that a forensic investigator must follow when investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techniques that can be applied to investigate an incident. “ “ - Virginia Aguilar, CHFI, KPMG, Madrid.
  • 8. EC-Council Computer Hacorensitor 06Page: EC-Council 6330 Riverside Plaza Ln NW Suite 210 Albuquerque, NM 87120 Tel: +1.505.341.3228 Fax: +1.505.341.0050 http://www.eccouncil.org EC-Council