Open Site Navigation

​Computer Hacking Forensic Investigator

Computer crime in today’s cyber world is on the rise in a dramatic way. Computer Investigation techniques have become widespread and are now being utilized by government, Fortune 100 companies, law enforcement and candidly any organization that is concerned about the security of their infrastructure. This course follows up on the skills gained within the Hacking Forensics course and then moves towards the area of digital forensics and computer crimes. The course goes past just the use of hacking tools, techniques and methodologies and instead covers the skills needed for hacker identification and prosecution through foot-printing techniques. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal.

Computer Hacking Forensic Investigator

Course Modules

Computer Forensics in Today's World


  • Forensics Science
  • Computer Forensics
  • Forensics Readiness
  • Cyber Crime
  • Cyber Crime Investigation
  • Corporate Investigations
  • Reporting a Cyber Crime




Footprinting and Reconnaissance


  • Footprinting Concepts
  • Footprinting Threats
  • Footprinting Methodology
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Footprinting using Google
  • WHOIS Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting through
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing




Scanning Networks


  • Overview of Network Scanning
  • CEH Scanning Methodology
  • Scanning Beyond IDS
  • Banner Grabbing
  • Scan for Vulnerability
  • Draw Network Diagrams
  • Prepare Proxies
  • Scanning Pen Testing




Enumeration


  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • UNIX/Linux Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • DNS Enumeration




System Hacking


  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing




Trojans and Backdoors


  • Trojan Concepts
  • Trojan Infection
  • Types of Trojans
  • Trojan Detection
  • Countermeasures
  • Anti-Trojan Software
  • Pen Testing for Trojans and Backdoors




Viruses and Worms


  • Virus and Worms Concepts
  • Types of Viruses
  • Computer Worms
  • Malware Analysis
  • Counter-measures
  • Penetration Testing for Virus




Sniffers


  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attack
  • DNS Poisoning
  • Sniffing Tools
  • Counter measures
  • Sniffing Pen Testing




Social Engineering


  • Social Engineering Concepts
  • Social Engineering Techniques
  • Imperso-nation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
  • Social Engineering Pen Testing




Denial of Service


  • DoS/DDoS Concepts
  • DoS Attack Techniques
  • Botnet
  • DDoS Case Study
  • DoS Attack Tools
  • Counter-measures
  • DoS/DDoS Protection Tools
  • Denial-of-Service (DoS) Attack Penetration Testing




Session Hijacking


  • Session Hijacking Concepts
  • Network-level Session Hijacking
  • Session Hijacking Tools
  • Counter-measuresSession Hijacking Pen Testing




Haking Webservers


  • Webserver Concepts
  • Webserver Attacks
  • Attack Methodology
  • Webserver Attack Tools
  • Counter-measures
  • Patch Management
  • Webserver Security Tools
  • Webserver Pen Testing




Hacking Web Applications


  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Analyze Web Applications
  • Attack Authentication Mechanism
  • Authorization Attack Schemes
  • Attack Session Management Mechanism
  • Perform Injection Attacks
  • Attack Data Connectivity
  • Attack Web App Client
  • Attack Web Services
  • Web Application Hacking Tools
  • Countermeasures
  • Security Tools
  • Web App Pen Testing




SQL Injection


  • SQL Injection Concepts
  • Testing for SQL Injection
  • Types of SQL Injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • Advanced SQL Injection
  • SQL Injection Tools
  • Evasion Techniques
  • Counter-measures




Hacking Wireless Networks


  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • GPS Mapping
  • Wireless Traffic Analysis
  • Launch Wireless Attacks
  • Crack Wi-Fi Encryption
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Security ToolsWi-Fi Pen Testing




Hacking Mobile Platforms


  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Hacking Windows Phone OS
  • Hacking BlackBerry
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools




Evading IDS, Firewalls and Honeypots


  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot System
  • Evading IDS
  • Evading Firewalls
  • Detecting Honeypots
  • Firewall Evading Tools
  • Countermeasures
  • Penetration Testing




Cryptography


  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure(PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptography Attacks
  • Cryptanalysis Tools




Penetration Testing


  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Techniques
  • Pen Testing Phases
  • Pen Testing Roadmap
  • Outsourcing Pen Testing Services





Duration of the courses: 120 Hours

Prerequisites

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

Key Benefits

This course helps learners to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.