Gain vendor neutral real-world forensics skills on a variety of industry leading software and dedicated forensics hardware using our unique forensics lab setup. Learn the legal requirements in the UK & Ireland and how to maintain the Chain of Custody.
Gain vendor neutral real-world forensics skills on a variety of industry leading software and dedicated forensics hardware using our unique forensics lab setup. Learn the legal requirements in the UK & Ireland and how to maintain the Chain of Custody. Prepare for the international recognised Forensics certification from the EC Council, the CHFI, and sit the exam on the final day.
EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defence and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
A Computer Forensics capability is an essential part of every business security posture. Investigation undertaken by non-certified and trained staff nearly always end in a collapse of the Chain of Custody and renders the evidence acquired unusable.
Learn how to maintain the Chain of Custody while investigating all types of computer crimes and policy and procedure breaches. Learn how to secure, acquire and investigate evidence from servers, the cloud, mobiles devices, SCADA system and many more.
Outline:
Computer Forensics in Today’s World
Computer Forensics Investigation Process
Understanding Hard Disks and File Systems
Operating System Forensics
Defeating Anti-Forensics Techniques
Data Acquisition and Duplication
Network Forensics
Investigating Web Attacks
Database Forensics
Cloud Forensics
Malware Forensics
Investigating Email Crimes
Mobile Forensics
Investigative Reports
At Nemstar, we understand how overwhelming it can be to protect and defend your organisation from attack and protect your information. Our experts work closely with you to build the trust, respect and partnership required to deliver world-class Information Security and Cyber Training tailored to meet your unique needs.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy