Gain knowledge in the specific security discipline of computer forensics from a vendor-neutral perspective. This course will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.
Course Objectives
Perform incident response and forensics
Perform electronic evidence collections
Perform digital forensic acquisitions
Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.
Examine and analyze text, graphics, multimedia, and digital images
Conduct thorough examinations of computer hard disk drives, and other electronic data storage media
Recover information and electronic data from computer hard drives and other data storage devices
Follow strict data and evidence handling procedures
Maintain audit trail (i.e., chain of custody) and evidence integrity
Work on technical examination, analysis and reporting of computer-based evidence
Prerequisites and Requirements
There are no prerequisites to take this course.
This course can be taken on either a PC or Mac.