Professional Documents
Culture Documents
www.ddls.com.au
Overview
This 5 day course covers a detailed methodological approach to forensic analysis including searching, seizing, chain of
custody, acquisition, preservation, analysis and reporting of digital evidence. All major tools and theories adopted by
forensic investigators are covered in this course.
The program comes with cloud-based virtual labs enabling students to practice various investigation techniques in a real-
time and simulated environment.
Exam vouchers are included with the course. Exams are not taken at the conclusion of the course. Exam candidates are
required to book their exam after completion of the course. Your EC-Council Exam Centre Voucher will come with an
expiry date. Please refer to the DDLS booking Terms and Conditions regarding exam voucher validity.
There are strict conditions applied to attendance at the EC-Council Certified Hacking Investigator courses. On the first day
of the course, students are required to sign a Liability Agreement form. A copy of this form and relevant links may be
found here.
Skills Gained
After attending this course you will be able to identify footprints and gather all necessary evidence for a prosecution of an intruder. CHFI has detailed labs
for hands-on learning experience. On average, approximately 50% of training time is dedicated to labs.
After attending this course you will have covered all the relevant knowledge-bases and skills required to meet regulatory standards such as ISO 27001,
PCI DSS, SOX, HIPPA, etc.
Key Topics
Module 01: Computer Forensics in Todays World
What is Anti-Forensics?
Anti-Forensics techniques
Introduction to OS Forensics
Windows Forensics
Linux Forensics
Shell Commands
Linux Log files
Collecting Volatile Data
Collecting Non-Volatile Data
MAC Forensics
Introduction to Malware
Introduction to Malware Forensics
Analysis of Malicious Documents
Malware Analysis Challenges
Email System
Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
Email Message
Steps to Investigate Email Crimes and Violation
Email Forensics Tools
Laws and Acts against Email Crimes
Target Audience
Law enforcement officers, system administrators, security officers, network security professionals, auditors
We can also deliver and customise this training course for larger groups saving your organisation time, money and resources. For
more information, please contact us on 1800 853 276.
Prerequisites
Basic knowledge on IT cyber-security, computer forensics and incident response. Certified Ethical Hacker would be advantageous.
The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is
conditional on acceptance of these terms and conditions.