Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

Computer Hacking Forensic Investigator v9 (CHFI)

E-COURSE:

Computer Hacking Forensic Investigator v9 (CHFI)

Instructor-led, video based E-Learning course.
Overview

A criminal always leaves a trace of evidence behind. Become a CHFI with EC-Council’s online course on CHFI certification. This online training course certifies individuals in forensic security discipline from a vendor-neutral perspective and enhances their knowledge of digital forensics to investigate and prevent cyber attacks efficiently. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Objectives
  • Gather volatile and non-volatile information from Windows, MAC and Linux
  • Recover deleted files and partitions in Windows, Mac OS X, and Linux
  • Perform keyword searches including using target words or phrases
  • Investigate events for evidence of insider threats or attacks
  • Support the generation of incident reports and other collateral
Target Audience
  • Police and other law enforcement personnel
  • Defense and Military personnel
  • e-Business Security professionals
  • Systems administrators
  • Legal professionals
  • Banking, Insurance and other professionals
  • Government agencies
  • IT managers
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. COMPUTER FORENSICS IN TODAY’S WORLD
1
Start
Overview
2
Start
Computer Forensics In Todays World
3
Start
Computer Forensics In Todays World Part 2
4
Start
Computer Forensics In Todays World Part 3
5
Start
Computer Forensics In Todays World Part 4
6
Start
Computer Forensics In Todays World Part 5
  1. COMPUTER FORENSICS INVESTIGATION PROCESS
7
Start
The Investigation Process
8
Start
The Investigation Process Part 2
9
Start
The Investigation Process Part 3
10
Start
The Investigation Process Part 4
11
Start
The Investigation Process Part 5
12
Start
The Investigation Process Part 6
13
Start
The Investigation Process Part 7
14
Start
Investigative Tools Demonstration
  1. UNDERSTANDING HARD DISKS AND FILE SYSTEMS
15
Start
Hard Disks And File Systems
16
Start
Hard Disks And File Systems Part 2
17
Start
Hard Disks And File Systems Part 3
18
Start
Hard Disks And File Systems Part 4
19
Start
Forensic File System Tools Demonstration
  1. DATA ACQUISITION AND DUPLICATION
20
Start
Data Acquisition And Duplication
21
Start
Data Acquisition And Duplication Part 2
22
Start
Data Acquisition And Duplication Part 3
23
Start
Data Acquisition Tools Demonstration
  1. DEFEATING ANTI-FORENSICS TECHNIQUES
24
Start
Defeating Anti-Forensic Techniques
25
Start
Defeating Anti-Forensic Techniques Part 2
26
Start
Defeating Anti-Forensic Techniques Part 3
27
Start
Defeating Anti-Forensic Techniques Part 4
28
Start
Anti-Forensics Tools Demonstration
  1. OPERATING SYSTEM FORENSICS
29
Start
Operating System Forensics
30
Start
Operating System Forensics Part 2
31
Start
Operating System Forensics Part 3
32
Start
Operating System Forensics Part 4
33
Start
Operating System Forensics Part 5
34
Start
Operating System Forensics Part 6
  1. NETWORK FORENSICS
35
Start
Network Forensics
36
Start
Network Forensics Part 2
37
Start
Network Forensics Part 3
38
Start
Network Forensics Part 4
  1. INVESTIGATING WEB ATTACKS
39
Start
Investigating Web Attacks
40
Start
Investigating Web Attacks Part 2
41
Start
Investigating Web Attacks Part 3
42
Start
Investigating Web Attacks Part 4
43
Start
Investigating Web Attacks Part 5
44
Start
Investigating Web Attacks Part 6
  1. DATABASE FORENSICS
45
Start
Database Forensics
46
Start
Database Forensics Part 2
  1. CLOUD FORENSICS
47
Start
Cloud Forensics
48
Start
Cloud Forensics Part 2
49
Start
Cloud Forensics Part 3
50
Start
Cloud Forensics Part 4
  1. MALWARE FORENSICS
51
Start
Malware Forensics
52
Start
Malware Forensics Part 2
  1. INVESTIGATING EMAIL CRIMES
53
Start
Investigating Email Crimes
54
Start
Investigating Email Crimes Part 2
55
Start
Investigating Email Crimes Part 3
  1. MOBILE FORENSICS
56
Start
Mobile Forensics
57
Start
Mobile Forensics Part 2
58
Start
Mobile Forensics Part 3
  1. INVESTIGATIVE REPORTS
59
Start
Forensics Report Writing And Presentation
E-COURSE Instructor-led, video based E-Learning course.
USD 19
  • 28:49:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top