Description
If a breach has occurred within your organisation, it falls to the Cyber Forensic Investigators to piece the puzzle together and try to determine who was responsible. Using techniques akin to that of detectives and crime scene investigators, you will follow any clues and use evidence to solve cyber-crimes.
A Forensic Investigator will work with law enforcement agencies, or private firms, to retrieve information from computers and other types of storage devices. They use this information to gather evidence which will be used to bring cyber criminals to justice. Professionals can also test the security of organisation’s information systems to protect from cyber-attacks while tracking down any previous attempts that were made.
This bundle has been put together to teach you the skills required to analyse a breach to find the culprit, and how to manage the incident, as taught in the Certified Incident Handler course. We have combined two of EC-Council’s most prestigious certifications to make you exceptionally useful in reverse engineering a hack or breach to catch those responsible.
Computer Hacking Forensic Investigator (CHFIv9)
Certified Incident Handler (ECIH)
The CHFI and ECIH qualifications are two of the most revered in the information security industry and in the EC-Council’s selection, which is why we’ve combined both to give you a complete learning solution for any aspiring Cyber Forensic Investigator.
KEY LEARNING POINTS
Certified Incident Handler:
Introduction to Incident Response and Handling
Risk Assessment
Incident Response and Handling Steps
CSIRT
Handling Network Security Incidents
Handling Malicious Code Incidents
Handling Insider Threats
Forensic Analysis and Incident Response
Incident Reporting
Incident Recovery
Security Policies and Laws
Computer Hacking Forensic Investigator:
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Operating System Forensic
Defeating Anti-Forensics Techniques
Data Acquisition and Duplication
Network Forensics
Investigating Web Attacks
Database Forensics
Cloud Forensics
Malware Forensics
Investigating Email Crimes
Mobile Forensics
Investigative Reports
ADVANTAGES OF THIS COURSE
Two globally recognised information security qualifications
Track down cyber-criminals and hackers with the right tools and techniques
Both courses are loaded with hands-on learning. ILabs are a cloud-based virtual lab, which approximately 50% of the learning time is devoted to
24/7 access to course content for 12 months
Units of Study
Computer Hacking Forensic Investigator (CHFIv9)
Certified Incident Handler (ECIH)
Reviews
There are no reviews yet.