وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Computer Hacking Forensics Investigator (CHFI) Cert Prep

سرفصل های دوره

If you love the idea of conducting digital forensics investigations to catch cybercriminals, you may want to think about pursuing a Computer Hacking Forensics Investigator (CHFI) certification. In this course, explore the skills you’ll need to prepare for the official EC Council CHFI certification exam. Learn how to detect online criminal activity, gather information and evidence, recover deleted data, and more, following along with expert instruction developed by Cybrary, the industry-leading cybersecurity training platform. In addition to covering the contents of the exam, this course will also help you prepare for a new role or improve your career options in the cybersecurity field.

Note: This course was created by Cybrary. We are pleased to host this training in our library.


01 - Introduction
  • 01 - Course introduction

  • 02 - 1. Computer Forensics Today
  • 01 - Computer forensics today Part 1
  • 02 - Computer forensics today Part 2
  • 03 - Computer forensics today Part 3
  • 04 - Analyze photos lab Part 1
  • 05 - Analyze photos lab Part 2
  • 06 - Analyze photos lab Part 3

  • 03 - 2. Computer Forensics Investigation Process
  • 01 - Computer forensics investigation process Part 1
  • 02 - Computer forensics investigation process Part 2

  • 04 - 3. Hard Disks and File Systems
  • 01 - Hard disks and file systems Part 1
  • 02 - Hard disks and file systems Part 2
  • 03 - Hard disks and file systems Part 3
  • 04 - Hard disks and file systems Part 4
  • 05 - Hard disks and file systems Part 5
  • 06 - Hard disks and file systems Part 6
  • 07 - Recovering graphics files lab Part 1
  • 08 - Recovering graphics files lab Part 2
  • 09 - Recovering graphics files lab Part 3

  • 05 - 4. Data Acquisition
  • 01 - Data acquisition Part 1
  • 02 - Data acquisition Part 2
  • 03 - Forensics lab Part 1
  • 04 - Forensics lab Part 2

  • 06 - 5. Anti-Forensics Techniques
  • 01 - Anti-forensics techniques Part 1
  • 02 - Anti-forensics techniques Part 2

  • 07 - 6. Operating System Forensics
  • 01 - Operating system forensics (FI) Part 1
  • 02 - Operating system forensics (FI) Part 2
  • 03 - Operating system forensics (FI) Part 3

  • 08 - 7. Network Forensics
  • 01 - Network forensics

  • 09 - 8. Web Attack Investigation
  • 01 - Web attack investigation Part 1
  • 02 - Web attack investigation Part 2
  • 03 - Web attack investigation Part 3

  • 10 - 9. Database Forensics
  • 01 - Database forensics

  • 11 - 10. Forensics with the Cloud
  • 01 - Forensics with the cloud Part 1
  • 02 - Forensics with the cloud Part 2

  • 12 - 11. Malware
  • 01 - Malware (FI) Part 1
  • 02 - Malware (FI) Part 2
  • 03 - Malware (FI) Part 3

  • 13 - 12. Email Investigation
  • 01 - Email investigation Part 1
  • 02 - Email investigation Part 2

  • 14 - 13. Mobile
  • 01 - Mobile Part 1
  • 02 - Mobile Part 2
  • 03 - Mobile Part 3
  • 04 - Mobile Part 4
  • 05 - Mobile Part 5

  • 15 - 14. Forensic Reporting
  • 01 - Forensic reporting

  • 16 - Conclusion
  • 01 - Course summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 27895
    حجم: 598 مگابایت
    مدت زمان: 312 دقیقه
    تاریخ انتشار: 17 دی 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید