Master Class Computer Forensics Program

Master Class Computer Forensics Program

Computer Forensics is one of the fastest growing sectors in the cybersecurity landscape. EC-Council Master Class has developed a combined program to give students a leg up!

Incident response and forensic analysis are related disciplines that can leverage similar tools and related data sets and since incident response is often considered a subset of the broader computer forensic discipline, EC-Council Master Class is bundling both the Computer Hacking Forensic Investigator (CHFI) and the Certified Incident Handler (CIH) courses.

“As of Dec 29, 2019, the average annual pay for a Computer Forensics Analyst in the United States is $99,014 a year. -ZipRecruiter”

“A Cyber Incident Responder typically a median salary of $106,000. -Career Builder”

 

The Master Class Package Includes

Computer Hacking Forensic Investigator Course (CHFI)

  • Computer Hacking Forensic Investigator Course (CHFI) Live Course – $1,109
  • CHFI Printed Courseware (US courses Only)
  • CHFI iLabs, Live Labs
  • CHFI Certification Exam
  • Exam Insurance Program – $499
  • CHFI Online Self-Paced Streaming Video Course (1 year access) – $718

Certified Incident Handler/Response (ECIH)

  • Certified Incident Handler/Response (ECIH) Online Self-Paced Streaming Video Course (1 year access) – $388
  • ECIH E-Courseware
  • ECIH iLabs, Live Labs
  • ECIH Certification Exam
  • Exam Insurance Program – $450

Computer Forensic Deep Dives

  • Dark Web Forensics Deep Dive – Self-Paced streaming video with access for one year – $54
  • Memory Forensics Deep Dive – Self-Paced streaming video access for one year – $54
  • Mobile Forensics Deep Dive – Self-Paced streaming video access for one year – $54

Course Description

  • The course was designed and developed by experienced SMEs and digital forensics practitioners
  • A complete vendor neutral course covering all major forensics investigations technologies and solutions
  • Detailed labs for hands-on learning experience; approximately 50% of training time is dedicated to labs
  • It covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc
  • The program presents a repeatable forensics investigation methodology required from a versatile digital forensic professional which increases your employability

What’s New

  • Coverage of latest forensics examination techniques, including Linux and MAC Forensics
  • Labs on Defeating Anti-forensics Techniques, Database Forensics, Cloud Forensics and Malware Forensics

What You Will Learn

  • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
  • Perform anti-forensic methods detection
  • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
  • Identify & check the possible source / incident origin.
  • Recover deleted files and partitions in Windows, Mac OS X, and Linux
  • Conduct reverse engineering for known and suspected malware files
  • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

About ECIH

The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.

About the Computer Forensics Deep Dive Workshops

Dark Web Forensics Deep Dive Workshop

In this workshop you will be given a tour of the dark web and walked through the technical details of how it works. You will get hands on experience conducting dark web investigations. This includes how to identify relevant information and how to investigate it.

The Malware and Memory Forensics Deep Dive Workshop

In this workshop, you will learn details of how malware functions, and how it is categorized. Then you will be shown details of the structure of memory, and how memory works. There is plenty of hands-on memory forensics. You will learn how to analyze memory to find evidence of malware.

The Mobile Forensic Deep Dive Workshop

This workshop will show you how to conduct such investigations. You will learn mobile phone architecture, how to use phone forensics tools and open-source tools. There will be a strong focus on Android phones, including how to use the Android Debugging Bridge to perform forensics.

Passing Score

In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 78%.

Exam Details

Exam Name: CHFI EC0 312-49       Number of Questions: 150       Test Duration: 4 Hours        Test Format: Multiple Choice      Test Delivery: ECC Exam Portal

CHFI Course Outline

1
Computer Forensics in Today’s World
2
Computer Forensics Investigation Process
3
Understanding Hard Disks and File Systems
4
Operating System Forensics
5
Defeating Anti- forensics Techniques
6
Data Acquisition and Duplication
7
Network Forensics
8
Computer Forensics in Today’s World
9
Computer Forensics Investigation Process
10
Understanding Hard Disks and File Systems
11
Operating System Forensics
12
Defeating Anti- forensics Techniques
13
Data Acquisition and Duplication
14
Network Forensics

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Get course
Enrolled: 779 students
Duration: 70 Hrs
Lectures: 14
Video: 70 Hrs
Level: Intermediate

Review

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mike Stuart

Support

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mila Kunis

Manager

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Adam Sendler

Designer

Social Network

Master Class Computer Forensics Program
Price:
$1,200 $899