CHFI Computer Hacking Forensic Investigator v11 – Cibersegurança

curso formação CHFI Computer Hacking Forensic Investigator, exame certificação CHFI Computer Hacking Forensic Investigator, CHFI Computer Hacking Forensic Investigator training course, CHFI Computer Hacking Forensic Investigator certification exam, CHFI Computer Hacking Forensic Investigator live online training, CHFI Computer Hacking Forensic Investigator online, CHFI Portugal, CHFI Angola, CHFI Moçambique, Hacking Forense Portugal, Hacking Forense Angola, Hacking Forense Moçambique

Mastering the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits with CHFI Computer Hacking Forensic Investigator.

 


Próximas DATAS       03-Fev-2025,   Inscreva-se       31-Mar-2025,   Inscreva-se       


avaliação do curso     4.8 em 5

curso formação CHFI Computer Hacking Forensic Investigator, exame certificação CHFI Computer Hacking Forensic Investigator, CHFI Computer Hacking Forensic Investigator training course, CHFI Computer Hacking Forensic Investigator certification exam, CHFI Computer Hacking Forensic Investigator live online training, CHFI Computer Hacking Forensic Investigator online, CHFI Portugal, CHFI Angola, CHFI Moçambique, Hacking Forense Portugal, Hacking Forense Angola, Hacking Forense Moçambique

Introdução
This course is available to be delivered in a classroom and Live-Training model.
Live Training brings you the dynamic environment of the classroom, to your desk. Using your computer, you interact with the trainer and the trainees as if you were with them in the classroom.

Click to learn how > Live Online Training works < CHFI Path

CHFI is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience regarding various forensic investigation techniques. Learn how to utilize standard forensic tools to successfully carryout a computer forensic investigation which can better prepare you to aid in the prosecution of perpetrators.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

Metodologia
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFI presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Destinatários
The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

Pré-Requisitos
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.
Your own laptop is required - bring your laptop to training.

Duração (dias)
5 days

Objectivos Gerais
At the end of the course students should be able to:
  • Computer forensics fundamentals, different types of cybercrimes and their investigation procedures, and regulations and standards that influence computer forensics investigation
  • Various phases involved in the computer forensics investigation process
  • Different types of disk drives and their characteristics, booting process and file systems in Windows, Linux, and Mac operating systems, file system examination tools, RAID and NAS/SAN storage systems, various encoding standards, and file format analysis
  • Data acquisition fundamentals and methodology, eDiscovery, and how to prepare image files for forensics examination
  • Various anti-forensics techniques used by attackers, different ways to detect them and related tools, and countermeasures
  • Volatile and non-volatile data acquisition in Windows-based operating systems, Windows memory and registry analysis, electron application analysis, web browser forensics, and examination of Windows files, ShellBags, LNK files, jump lists, and Windows event logs
  • Volatile and non-volatile data acquisition and memory forensics in Linux and Mac operating systems
  • Network forensics fundamentals, event correlation concepts, Indicators of Compromise (IOCs) and ways to identify them from network logs, techniques and tools related to network traffic investigation, incident detection and examination, and wireless attack detection and investigation
  • Malware forensics concepts, static and dynamic malware analysis, system and network behavior analysis, and ransomware analysis
  • Web application forensics and challenges, web application threats and attacks, web application logs (IIS logs, Apache web server logs, etc.), and how to detect and investigate various web application attacks
  • Tor browser working methodology and steps involved in the Tor browser forensics process
  • Cloud computing concepts, cloud forensics and challenges, fundamentals of AWS, Microsoft Azure, and Google Cloud and their investigation processes
  • Components in email communication, steps involved in email crime investigation, and social media forensics
  • Architectural layers and boot processes of Android and iOS devices, mobile forensics process, various cellular networks, SIM file system, and logical and physical acquisition of Android and iOS devices
  • Different types of IoT threats, security problems, vulnerabilities and attack surfaces areas, and IoT forensics processes and challenges

Programa
  1. Computer Forensics in Today's World
  2. Computer Forensic Investigation Process
  3. Understanding Hard Disks and File Systems
  4. Data Acquisition and Duplication
  5. Defeating Anti-Forensics Techniques
  6. Windows Forensics
  7. Linux and Mac Forensics
  8. Network Forensics
  9. Investigating Web Attacks
  10. Dark Web Forensics
  11. Cloud Forensics
  12. Email and Social Media Forensics
  13. Mobile Forensics
  14. IoT Forensics

Exame
The CHFI 312-49
Number of Questions: 150
Passing Score: 70%
Test Duration: 4 hours
Test Format: Multiple choice

Certificação
CHFI Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Formador
Trainer certified by EC-COUNCIL.

Informações Gerais
  • Training in Portuguese and English language.
  • Online training material in English, with online access for 1 year.
  • Hands on Labs - environment that simulates a real time information infrastructure. The iLabs is a subscription based service that allows students to log on to a virtualized remote machine running Windows Server to perform various exercises featured in the CHFI Lab Guide. All you need is a web browser to connect and start experimenting. The virtual machine setup reduces the time and effort spent by instructors and partners prior to the classroom engagement. It is a hassle free service available 24/7 x number of days subscribed.
  • Digital Behaviour Participation Certificate with 40 CPD/CPE credits.
  • EC-COUNCIL Certificate.
  • EC-COUNCIL Exam. You can schedule the exam within 11 months after training. The exam is available online.

Benefícios

Datas e Preço

Click on “Preço e Inscrição” to access more information and also the price:

Programa Datas Garantidas
(*) Todas as datas deste curso são garantidas nos eventos de ocorrem em Lisboa. Nas outras localizações os eventos estão sujeitos a um número mínimo de participantes Na Behaviour todos os cursos em Lisboa ocorrem independentemente do número de formandos em sala. O conceito de constituição de turmas não existe no modelo pedagógico da Behaviour, por isso é que todas as datas públicas no site são garantidas. Assim, se estiver em Portugal ou em qualquer outra parte do mundo pode preparar a sua semana e a sua viagem, desde que garanta a sua inscrição no curso.

Descontos de Volume
A Behaviour para empresas atribui descontos dependendo do número total de participantes inscritos. Peça simulação de valores para o número de participantes que pretende inscrever para training@behaviour-group.com ou fale connosco através do chat.

Hotéis e Informações Úteis
Saiba onde pode ficar em Lisboa, perto da Behaviour. Consulte >>Onde Ficar<<