Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting proof to report the crime and conduct investigation to prevent future attacks.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer misuse or crime, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or encrypted, recovering deleted, or damaged file information.
The CHFI course will give participants the require skills to recognize an intruder's footprints and to properly gather the require evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including hardware, software and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield begins in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the skills or knowledge to identify, track, and prosecute the cyber criminal, then this is the course for you.
The CHFI program is designed for all IT professionals involved with information system security, incident response, and computer forensics.
IT Professional having experience as Security Administrator, Security Manager, Network Administrator or Having relevant experience or undergone training of Certified Ethical hacker.
|Duration of the course:||5 days (8 Hrs/Day)|
- Security Incident Report
- Aspects of Organizational Security
- Evolution of Computer Forensics
- Objective of Computer Forensics
- Need for Compute Forensics
- Benefits of Forensics Readiness
- Goals of Forensics Readiness
- Forensics Readiness Planning
- Computer Facilitated Crimes
- Modes of Attacks
- Examples of Cyber Crime
- Types of Computer Crimes
- Cyber Criminals
- Organized Cyber Crime: Organizational Chart
- How Serious are Different Types of Incidents?
- Disruptive Incidents to the Business
- Cost Expenditure Responding to the Security Incident
Cyber Crime Investigation:
- Key Steps in Forensics Investigation
- Rules of Forensics Investigation
- Need for Forensics Investigator
- Role of Forensics Investigator
- Accessing Computer Forensics Resources
- Role of Digital Evidence
- Understanding Corporate Investigations
- Approach to Forensics Investigation: A Case Study
- Instructions for the Forensic Investigator to Approach the Crime Scene
- Why and When Do You Use Computer Forensics?
- Enterprise Theory of Investigation (ETI)
- Legal Issues
- Reporting the Results
Reporting a Cyber Crime:
- Why you should Report Cybercrime?
- Reporting Computer-Related Crimes
- Person Assigned to Report the Crime
- When and How to Report an Incident?
- Who to Contact at the Law Enforcement?
- Federal Local Agents Contact
- More Contacts
- CIO Cyberthreat Report Form