Computer Hacking Forensic Investigator V.8


 

CHFI V.8 (Computer Hacking Forensic Investigator V.8) Tools


The CHFI course imparts the necessary skills to identify the hacker's footprints and gather the necessary evidences to prosecute. CHFI certification covers top tools of the forensic investigation including software, hardware and specialized techniques.
It covers the aspects of the mobile, printer, network, credit card frauds, financial espionages PDA, recovering lost data, etc.



CHFIv8 Curriculum Consists Of 22 Instructor-led Training Modules:

Module 01: Computer Forensics in Today's World

Module 02: Computer Forensics Investigation Process

Module 03: Searching and Seizing Computers

Module 04: Digital Evidence

Module 05: First Responder Procedures

Module 06: Computer Forensics Lab

Module 07: Understanding Hard Disks and File Systems

Module 08: Windows Forensics

Module 09: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Partitions

Module 11: Forensics Investigation Using Access Data FTK

Module 12: Forensics Investigation Using Encase

Module 13: Steganography and Image File Forensics

Module 14: Application Password Crackers

Module 15: Log Capturing and Event Correlation

Module 16: Network Forensics, Investigating Logs

Module 17: Investigating Wireless Attacks

Module 18: Investigating Web Attacks

Module 19: Tracking Emails and Investigating Email Crimes

Module 20: Mobile Forensics

Module 21: Investigative Reports

Module 22: Becoming an Expert Witness
For More information CLICK HERE
 


Download Links:
DVD 1 - part 1 CLICK HERE
DVD 1 - part 2 CLICK HERE
DVD 1 - part 3 CLICK HERE
DVD 1 - part 4 CLICK HERE
 
DVD 2 - part 1 CLICK HERE
DVD 2 - part 2 CLICK HERE
DVD 2 - part 3 CLICK HERE
DVD 2 - part 4 CLICK HERE
 
DVD 3 - part 1 CLICK HERE
DVD 3 - part 2 CLICK HERE
DVD 3 - part 3 CLICK HERE
DVD 3 - part 4 CLICK HERE
DVD 3 - part 5 CLICK HERE
 
 
DVD 4 - part 1 CLICK HERE
DVD 4 - part 2 CLICK HERE
DVD 4 - part 3 CLICK HERE
DVD 4 - part 4 CLICK HERE
DVD 4 - part 5 CLICK HERE
Thanks. You may also like Certified Ethical Hacker v.7.1 Full Course 
 
Tags:

0 comments