WiebeTech SS8 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Mise en réseau WiebeTech SS8. CH – CHFI Computer Hacking Forensic Investigator v8.0 Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 20
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
CH CHFI
Computer Hacking Forensic Investigator v8.0 - Detailed Course Outline
Summary
Duration Vendor Audience
5 Days hands-on training EC-Council Security Professionals
Level Technology Category
Intermediate Ethical Hacking Computer Forensic Investigation
Delivery Method Training Credits / Vouchers
Instructor-led (Classroom) N/A
Course Content
Module 01: Computer Forensics in Today's World
1. Forensics Science
2. Computer Forensics
1. Security Incident Report
2. Aspects of Organizational Security
3. Evolution of Computer Forensics
4. Objective of Computer Forensics
5. Need for Compute Forensics
3. Forensics Readiness
1. Benefits of Forensics Readiness
2. Goals of Forensics Readiness
3. Forensics Readiness Planning
4. Cyber Crime
1. Computer Facilitated Crimes
2. Modes of Attacks
3. Examples of Cyber Crime
4. Types of Computer Crimes
5. Cyber Criminals
6. Organized Cyber Crime: Organizational Chart
7. How Serious are Different Types of Incidents?
8. Disruptive Incidents to the Business
9. Cost Expenditure Responding to the Security
Incident
5. Cyber Crime Investigation
1. Key Steps in Forensics Investigation
2. Rules of Forensics Investigation
3. Need for Forensics Investigator
4. Role of Forensics Investigator
5. Accessing Computer Forensics Resources
6. Role of Digital Evidence
6. Corporate Investigations
1. Understanding Corporate Investigations
2. Approach to Forensics Investigation: A Case Study
3. Instructions for the Forensic Investigator to
Approach the Crime Scene
4. Why and When Do You Use Computer Forensics?
5. Enterprise Theory of Investigation (ETI)
6. Legal Issues
7. Reporting the Results
7. Reporting a Cyber Crime
1. Why you Should Report Cybercrime?
2. Reporting Computer-Related Crimes
3. Person Assigned to Report the Crime
4. When and How to Report an Incident?
5. Who to Contact at the Law Enforcement?
6. Federal Local Agents Contact
7. More Contacts
8. CIO Cyberthreat Report Form
Module 02: Computer Forensics Investigation Process
1. Investigating Computer Crime
1. Before the Investigation
2. Build a Forensics Workstation
3. Building the Investigation Team
4. People Involved in Computer Forensics
5. Review Policies and Laws
6. Forensics Laws
7. Notify Decision Makers and Acquire Authorization
8. Risk Assessment
9. Build a Computer Investigation Toolkit
2. Steps to Prepare for a Computer Forensics Investigation
3. Computer Forensics Investigation Methodology
1. Obtain Search Warrant
1. Example of Search Warrant
2. Searches Without a Warrant
2. Evaluate and Secure the Scene
1. Forensics Photography
2. Gather the Preliminary Information at the
Scene
3. First Responder
3. Collect the Evidence
1. Collect Physical Evidence
1. Evidence Collection Form
2. Collect Electronic Evidence
3. Guidelines for Acquiring Evidence
4. Secure the Evidence
1. Evidence Management
2. Chain of Custody
1. Chain of Custody Form
5. Acquire the Data
Vue de la page 0
1 2 3 4 5 6 ... 19 20

Résumé du contenu

Page 1 -

CH – CHFI Computer Hacking Forensic Investigator v8.0 - Detailed Course Outline Summary Dura

Page 2

13. ZAR Windows Data Recovery 14. AppleXsoft File Recovery for MAC 15. Quick Recovery for FAT & NTFS 16. TestDisk for Linux Module 11: Foren

Page 3

3. Configuring EnCase: Debug Tab 4. Configuring EnCase: Colors Tab and Fonts Tab 5. Configuring EnCase: EnScript Tab and Storage Paths Tab 6. Sh

Page 4

5. Linguistic Steganography 6. Types of Steganography 1. Image Steganography 1. Least Significant Bit Insertion 2. Masking and Filtering 3.

Page 5

10. Picture Viewer: IrfanView 11. Picture Viewer: ACDSee Photo Manager 12 12. Picture Viewer: Thumbsplus 13. Picture Viewer: AD Picture Viewer L

Page 6

15. Windows Password Reset Professional 16. Windows Password Reset Standard 17. Krbpwguess 18. Password Kit 19. WinPassword 20. Passware Kit E

Page 7

2. Types of Intrusion Detection Systems 3. General Indications of Intrusions 10. Firewall 11. Honeypot 2. Network Attacks 1. Network Vulnerab

Page 8

1. Key Points to Remember 2. Steps for Investigation 1. Obtain a Search Warrant 2. Identify Wireless Devices at Crime Scene 1. Search for Add

Page 9

Module 18: Investigating Web Attacks 1. Introduction to Web Applications and Webservers 1. Introduction to Web Applications 2. Web Application C

Page 10

1. Whois Lookup 2. SmartWhois 3. ActiveWhois 4. LanWhois 5. CountryWhois 6. CallerIP 7. Hide Real IP 8. IP - Address Manager 9. Pandora FMS

Page 11

8. Integrated Circuit Card Identification (ICCID) 9. International Mobile Equipment Identifier (IMEI) 10. Electronic Serial Number (ESN) 11. Pre

Page 12

1. Duplicate the Data (Imaging) 2. Verify Image Integrity 1. MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles 3. Recover Lost or

Page 13

3. Medical & Psychological Experts 4. Civil Litigation Experts 5. Construction & Architecture Experts 6. Criminal Litigation Experts 3.

Page 14

3. B. Hearsay 4. C. Other Issues Module 04: Digital Evidence 1. Digital Data 1. Definition of Digital Evidence 2. Increasing Awareness of Digi

Page 15

4. Dealing with Powered Off Computers 5. Dealing with Networked Computer 6. Dealing with Open Files and Startup Files 7. Operating System Shutdo

Page 16

4. v4 Combo Adapters 5. ProSATA SS8 6. HotPlug 21. CelleBrite 1. UFED System 2. UFED Physical Pro 3. UFED Ruggedized 22. DeepSpar 1. Disk

Page 17

5. List of Special Purpose File Systems 6. List of Shared Disk File Systems 7. Popular Windows File Systems 1. File Allocation Table (FAT) 1.

Page 18

7. Shares 8. Audit Policy 9. Wireless SSIDs 10. Autostart Locations 11. System Boot 12. User Login 13. User Activity 14. Enumerating Autosta

Page 19

16. Process Explorer 17. Security Task Manager 18. PrcView 19. ProcHeapViewer 20. Memory Viewer 21. Tool: PMDump 22. Word Extractor 23. Belk

Page 20

26. Forensic Tower IV Dual Xeon 27. Digital Intelligence Forensic Hardware: FREDDIE 28. DeepSpar: 3D Data Recovery 1. Phase 1 Tool: PC-3000 Dri

Commentaires sur ces manuels

Pas de commentaire