Description
CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
1.0 Intro to Course Pt. 1
1.1 Intro to Course Pt. 2
1.2 Intro to Course Pt. 3
1.3 Intro to Course Pt. 4
1.4 Intro to Course Pt. 5
1.5 Intro to Forensics Pt. 1
1.6 Intro to Forensics Pt. 2
1.7 Intro to Forensics Pt. 3
1.8 Intro to Forensics Pt. 4
1.9 Intro to Forensics Pt. 5
1.10 Intro to Forensics Pt. 6
1.11 Intro to Forensics Pt. 7
1.12 Intro to Forensics Pt. 8
2.0 Forensics Investigation Process Pt. 1
2.1 Forensics Investigation Process Pt. 2
2.2 Forensics Investigation Process Pt. 3
2.3 Forensics Investigation Process Pt. 4
2.4 Forensics Investigation Process Pt. 5
2.5 Forensics Investigation Process Pt. 6
2.6 Forensics Investigation Process Pt. 7
2.7 Forensics Investigation Process Pt. 8
2.8 Forensics Investigation Process Pt. 9
2.9 Forensics Investigation Process Pt. 10
3.0 Searching and Seizing Pt. 1
3.1 Searching and Seizing Pt. 2
3.2 Searching and Seizing Pt. 3
3.3 Searching and Seizing Pt. 4
3.4 Searching and Seizing Pt. 5
4.0 Digital Evidence Pt. 1
4.1 Digital Evidence Pt. 2
4.2 Digital Evidence Pt. 3
4.3 Digital Evidence Pt. 4
4.4 Digital Evidence Pt. 5
4.5 Digital Evidence Pt. 6
4.6 Digital Evidence Pt. 7
5.0 First Responder Procedures Pt. 1
5.1 First Responder Procedures Pt. 2
5.2 First Responder Procedures Pt. 3
5.3 First Responder Procedures Pt. 4
5.4 First Responder Procedures Pt. 5
5.5 First Responder Procedures Pt. 6
5.6 First Responder Procedures Pt. 7
5.7 First Responder Procedures Pt. 8
6.0 Forensic Lab Pt. 1
6.1 Forensic Lab Pt. 2
6.2 Forensic Lab Pt. 3
6.3 Forensic Lab Pt. 4
6.4 Forensic Lab Pt. 5
7.0 Hard Disks and File Systems Pt. 1
7.1 Hard Disks and File Systems Pt. 2
7.2 Hard Disks and File Systems Pt. 3
7.3 Hard Disks and File Systems Pt. 4?
7.4 Hard Disks and File Systems Pt. 5
7.5 Hard Disks and File Systems Pt. 6
7.6 Hard Disks and File Systems Pt. 7
7.7 Hard Disks and File Systems Pt. 8
7.8 Hard Disks and File Systems Pt. 9
7.9 Hard Disks and File Systems Pt. 10
8.0 Windows Forensics Pt. 1
8.1 Windows Forensics Pt. 2
8.2 Windows Forensics Pt. 3
8.3 Windows Forensics Pt. 4
8.4 Windows Forensics Pt. 5
8.5 Windows Forensics Pt. 6
8.6 Windows Forensics Pt. 7
8.7 Windows Forensics Pt. 8
8.8 Windows Forensics Pt. 9
8.9 Windows Forensics Pt. 10
9.0 Data Acquisition and Duplication Pt. 1
9.1 Data Acquisition and Duplication Pt. 2
9.2 Data Acquisition and Duplication Pt. 3
9.3 Data Acquisition and Duplication Pt. 4
9.4 Data Acquisition and Duplication Pt. 5
9.5 Data Acquisition and Duplication Pt. 6
9.6 Data Acquisition and Duplication Pt. 7
10.0 Recovering Deleted Files and Partitions Pt. 1
10.1 Recovering Deleted Files and Partitions Pt. 2
11.0 Using Access Data FTK and Special Steps Pt. 1
11.1 Using Access Data FTK and Special Steps Pt. 2
11.2 Using Access Data FTK and Special Steps Pt. 3
11.3 Using Access Data FTK and Special Steps Pt. 4
11.4 Using Access Data FTK and Special Steps Pt. 5
11.5 Using Access Data FTK and Special Steps Pt. 6
11.6 Using Access Data FTK and Special Steps Pt. 7
11.7 Using Access Data FTK and Special Steps Pt. 8
12.0 EnCase Pt. 1
12.1 EnCase Pt. 2
12.2 EnCase Pt. 3
13.0 Stenography Pt. 1
13.1 Stenography Pt. 2
13.2 Stenography Pt. 3
13.3 Stenography Pt. 4
14.0 Passwords Pt. 1
14.1 Passwords Pt. 2
14.2 Passwords Pt. 3
14.3 Passwords Pt. 4
15.0 Log Correlation Pt. 1
15.1 Log Correlation Pt. 2
15.2 Log Correlation Pt. 3
15.3 Log Correlation Pt. 4
15.4 Log Correlation Pt. 5
15.5 Log Correlation Pt. 6
16.0 Network Forensics Pt. 1
16.1 Network Forensics Pt. 2
16.2 Network Forensics Pt. 3
16.3 Network Forensics Pt. 4
17.0 Wireless Attacks Pt. 1
17.1 Wireless Attacks Pt. 2
17.2 Wireless Attacks Pt. 3
18.0 Web Attacks Pt. 1
18.1 Web Attacks Pt. 2
18.2 Web Attacks Pt. 3
18.3 Web Attacks Pt. 4
18.4 Web Attacks Pt. 5
18.5 Web Attacks Pt. 6
18.6 Web Attacks Pt. 7
18.7 Web Attacks Pt. 8
19.0 Email Crimes Pt. 1
19.1 Email Crimes Pt. 2
19.2 Email Crimes Pt. 3
19.3 Email Crimes Pt. 4
Module 20: Mobile Investigation
20.0 Mobile Investigation Pt. 1
20.1 Mobile Investigation Pt. 2
20.2 Mobile Investigation Pt. 3
20.3 Mobile Investigation Pt. 4
20.4 Mobile Investigation Pt. 5
Module 21: Investigative Reports
21.0 Investigation Reports Pt. 1
21.1 Investigation Reports Pt. 2
21.2 Investigation Reports Pt. 3
21.3 Investigation Reports Pt. 4
Module 22: Expert Witness
22.0 Expert Witness Pt. 1
22.1 Expert Witness Pt. 2
22.2 Expert Witness Pt. 3
Reviews
There are no reviews yet.