Computer Hacking Prevention (CHP)
Course Description
Computer crime in today’s cyber world is on the rise in a dramatic way.
Computer Investigation techniques have become widespread and are now
being utilized by government, Fortune 100 companies, law enforcement and
candidly any organization that is concerned about the security of their
infrastructure. This course follows up on the skills gained within the Certified
Ethical Hacker course and then moves towards the area of digital forensics
and computer crimes. The course goes past just the use of hacking tools,
techniques and methodologies and instead covers the skills needed for
hacker identification and prosecution through foot-printing techniques. A few
of the topics included in this course are:
Course Outline
Mod 1 Intro to Course
Mod 1.5 Intro to Forensics
Mod 2 Forensics Investigation Process
Mod 3 Searching and Seizing
Mod 4 Digital Evidence
Mod 5 First Responder Procedures
Mod 6 Forensic Lab
Mod 7 Hard Disks and File Systems
Mod 8 Windows Forensics
Mod 9 Data Acquisition and Duplication
Mod 10 Recovering Deleted Files and Partitions
Mod 11 Using Access Data FTK and Special Steps
Mod 12 EnCase
Mod 13 Stenography
Mod 14 Passwords
Mod 15 Log Correlation
Mod 16 Network Forensics
Mod 17 Wireless Attacks
Mod 18 Web Attacks
Mod 19 Email Crimes
Mod 20 Mobile Investigation
Mod 21 Investigation Reports
Mod 22 Expert Witness
Reviews
There are no reviews yet.