Ваша корзина пуста
Сумма: 0 руб.

Расследование хакерских инцидентов

О курсе
Расследование хакерских инцидентов
от 72 500 руб.
Заказать курс

Расследование хакерских инцидентов

Цель курса – научить основным принципам проведения программно-технической экспертизы с целью сбора цифровых улик, выявления внутренних угроз, следов коммерческого шпионажа, и других обстоятельств влияющих на защищенность систем.
Расписание и цены
Этот курс набирает желающих участников. Отправьте заявку на участие, а когда наберётся достаточное количество, мы с вами свяжемся.
Заказать обучение
Программа курса

Курс посвящен методикам расследования хакерских инцидентов. Описаны последовательности многочисленных тестов по выявлению фактов проникновения хакера в систему и предложены рекомендации по отслеживанию действий потенциального нарушителя.

 

Course Description:

 

EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

 

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition,handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

 

Target Audience:

 

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

 

Prerequisites

 

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

 

Duration

 

5 days

 

Key features of CHFIv8

 

·         UpdatedContent. CHFIv8 contains updated information including concepts, methodologies and tools.

·         OrganizedContent. The well-organized content enhances the learning experience and ensures better understanding of key concepts and investigation methodologies.

·         Methodological Approach. CHFIv8 presents step-by-step procedures,best practices and guidelines to carry out forensic investigation.

·         Illustration Rich. Concepts are well-illustrated to create self-explanatory slides which makes it classroom and instructor friendly.

·         New Investigation Techniques. CHFIv8 provides in-depth knowledge of new techniques and tools used in forensic investigation to meet the toughest challenges in fighting cybercrime.

·         Investigation Tools. CHFIv8 showcases hundreds of investigation tools including EnCase, Access Data FTK, and ProDiscover.

·         Sample Evidence Files. CHFIv8 DVD contains a huge cache of evidence files for analysis including RAW, .dd images, video and audio files, MS Office files, systems files etc.

·         Visual Content Technology. Use of rich Visual Content Technology to present concepts and forensic investigation techniques.

·         Lab Setup. Lab setup manual provides detailed procedures to setup a lab environment complete with network environment, evidence files and other prerequisite tools.

 

Version Comparison

 

Computer Hacking Forensic Investigator courseware has undergone tremendous improvements compared to its previous versions. We have invested 4 times the effort in fundamental research and development since its last release, and have given CHFIv8 a complete makeover. The new version is a breakaway from earlier releases with more emphasis given on techniques and methodologies, which helps in the development of an advanced forensic analysis skill set. ‘A picture is worth a thousand words’ and we at EC-Council have enforced the saying by using addvance Visual Content technology (VCT) to explain various forensic investigation concepts. The comprehensive instructor slides and student manual in CHFIv8 empowers the instructors with flawless flow and outstanding diagrammatic representation of the investigation techniques, which makes it easier to teach and enables students to understand the concepts.

 

What will you learn?

 

Students going throughCHFItraining will learn:

 

          The computer forensic investigation process and the various legal issues involved

          Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner

          Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category

          Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene

          How to set up a computer forensics lab and the tools involved in it

          Various file systems and how to boot a disk

          Gathering volatile and non-volatile information from Windows

          Data acquisition and duplication rules, validation methods and tools required

          How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux

          The process involved in forensic investigation using AccessData FTK and EnCase

          Steganography and its techniques, Steganalysis, and image file forensics

          Password Cracking Concepts, tools, types of password attacks and how to investigate password protected files

          Different types of log capturing, log management, time synchronization, and log capturing tools

          How to investigate logs, network traffic, wireless attacks, and web attacks

          How to track e-mails and investigate e-mail crimes

          Mobile forensics and mobile forensics software and hardware tools

          How to write investigative reports

 

Course Outline Version 8

 

CHFIv8 curriculum consists of 22 instructor-led training modules.

          Computer Forensics in Today’s World

          Computer Forensics Investigation Process

          Searching and Seizing Computers

          Digital Evidence

          First Responder Procedures

          Computer Forensics Lab

          Understanding Hard Disks and File Systems

          Windows Forensics

          Data Acquisition and Duplication

          Recovering Deleted Files and Deleted Partitions

          Forensics Investigation Using AccessData FTK

          Forensics Investigation Using EnCase

          Steganography and Image File Forensics

          Application Password Crackers

          Log Capturing and Event Correlation

          Network Forensics, Investigating Logs and Investigating Network Traffic

          Investigating Wireless Attacks

          Investigating Web Attacks

          Tracking Emails and Investigating Email Crimes

          Mobile Forensics

          Investigative Reports

          Becoming an Expert Witness