Cyber Forensics

Cyber Forensics
£1,975
Enquire Now
Finance

If a breach has occurred within your organisation, it falls to the Cyber Forensic Investigators to piece the puzzle together and try to determine who was responsible. Using techniques akin to that of detectives and crime scene investigators, you will follow any clues and use evidence to solve cyber-crimes.

A Forensic Investigator will work with law enforcement agencies, or private firms, to retrieve information from computers and other types of storage devices. They use this information to gather evidence which will be used to bring cyber criminals to justice. Professionals can also test the security of organisation’s information systems to protect from cyber-attacks while tracking down any previous attempts that were made.

This bundle has been put together to teach you the skills required to analyse a breach to find the culprit, and how to manage the incident, as taught in the Certified Incident Handler course. We have combined two of EC-Council’s most prestigious certifications to make you exceptionally useful in reverse engineering a hack or breach to catch those responsible.

  • Computer Hacking Forensic Investigator (CHFIv9)
  • Certified Incident Handler (ECIH)

The CHFI and ECIH qualifications are two of the most revered in the information security industry and in the EC-Council’s selection, which is why we’ve combined both to give you a complete learning solution for any aspiring Cyber Forensic Investigator.

KEY LEARNING POINTS

Certified Incident Handler:

  • Introduction to Incident Response and Handling
  • Risk Assessment
  • Incident Response and Handling Steps
  • CSIRT
  • Handling Network Security Incidents
  • Handling Malicious Code Incidents
  • Handling Insider Threats
  • Forensic Analysis and Incident Response
  • Incident Reporting
  • Incident Recovery
  • Security Policies and Laws

Computer Hacking Forensic Investigator:

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Operating System Forensic
  • Defeating Anti-Forensics Techniques
  • Data Acquisition and Duplication
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports

ADVANTAGES OF THIS COURSE

  • Two globally recognised information security qualifications
  • Track down cyber-criminals and hackers with the right tools and techniques
  • Both courses are loaded with hands-on learning. ILabs are a cloud-based virtual lab, which approximately 50% of the learning time is devoted to
  • 24/7 access to course content for 12 months
Computer Hacking Forensic Investigator (CHFIv9)
  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Operating System Forensics
  • Defeating Anti-Forensics Techniques
  • Data Acquisition and Duplication
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
Certified Incident Handler (ECIH)
  • Introduction to Incident Response and Handling
  • Risk Assessment
  • Incident Response and Handling Steps
  • CSIRT
  • Handling Network Security Incidents
  • Handling Malicious Code Incidents
  • Handling Insider Threats
  • Forensic Analysis and Incident Response
  • Incident Reporting
  • Incident Recovery
  • Security Policies and Laws
Course Code
EC113425
Type
Online Course
Course Access
1 Year
Exams Included
No
Processor
1 gigahertz (GHz)
RAM
1 GB
Operating Systems
Windows 7
Windows 8
Windows 10
Mac OS
iOS
Browsers
Internet Explorer 8 or above
Google Chrome
Safari 6 or above
Mozilla Firefox
Windows, Mac, iPhone, iPad, Android
Test your PC's speed and Compatibility for Free
Click here

ENQUIRY

loader
Your query is submitted.