Gain knowledge in the specific security discipline of computer forensics from a vendor-neutral perspective. This course will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s)  are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.
 

Course Objectives

Perform incident response and forensics

Perform electronic evidence collections

Perform digital forensic acquisitions

Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.

Examine and analyze text, graphics, multimedia, and digital images

Conduct thorough examinations of computer hard disk drives, and other electronic data storage media

Recover information and electronic data from computer hard drives and other data storage devices

Follow strict data and evidence handling procedures

Maintain audit trail (i.e., chain of custody) and evidence integrity

Work on technical examination, analysis and reporting of computer-based evidence

Prerequisites and Requirements

There are no prerequisites to take this course.

This course can be taken on either a PC or Mac.