Computer Hacking Forensic Investigator
Computer Hacking Forensic Investigator
Forensic Investigator
1 EC-Council
Computer Forensics
Computer hacking forensic investigation is the process identification of evidence in computer related crime
of detecting hacking attacks and properly extracting and abuse cases. This may range from tracing the tracks
evidence to report the crime and conduct audits to of a hacker through a client’s systems, to tracing the
prevent future attacks. Computer forensics is simply originator of defamatory emails, to recovering signs of
the application of computer investigation and analysis fraud.
techniques in the interests of determining potential
legal evidence. Evidence might be sought in a wide The CHFI course will provide participants the necessary
range of computer crime or misuse, including but not skills to identify an intruder’s footprints and to properly
limited to theft of trade secrets, theft of or destruction gather the necessary evidence to prosecute in the court
of intellectual property, and fraud. CHFI investigators of law.
can draw on an array of methods for discovering data
that resides in a computer system, or recovering deleted, The CHFI course will benefit:
encrypted, or damaged file information.
• Police and other law enforcement personnel
Securing and analyzing electronic evidence is a • Defense and Military personnel
central theme in an ever-increasing number of conflict • e-Business Security professionals
situations and criminal cases. Electronic evidence is • Systems administrators
critical in the following situations: • Legal professionals
• Banking, Insurance and other professionals
• Disloyal employees • Government agencies
• Computer break-ins • IT managers
• Possession of pornography
• Breach of contract
• Industrial espionage
• E-mail Fraud
• Bankruptcy
• Disputed dismissals
• Web page defacements
• Theft of company documents
2 EC-Council
3 EC-Council
Computer Hacking Forensic Investigator § Assessing the Case
(CHFI)
§ Planning Your Investigation
Course Outline v1
§ Securing Your Evidence
Module 1 Computer Forensics and
Investigations as a Profession § Understanding Data-Recovery Workstations
and Software
§ Understanding Computer Forensics
§ Setting Up Your Workstation for Computer
§ Comparing Definitions of Computer Forensics
Forensics
§ Executing an Investigation
§ Exploring a Brief History of Computer
Forensics § Gathering the Evidence
4 EC-Council
§ Boot Partition Concerns § Exploring Macintosh Boot Tasks
5 EC-Council
§ Determining the Physical Layout of a § Maintaining Operating Systems and
Computer Forensics Lab Application Software Inventories
§ Evidence Lockers
Module 6 Current Computer Forensics
§ Facility Maintenance Tools
§ Physical Security Needs § Evaluating Your Computer Forensics
Software Needs
§ Auditing a Computer Forensics Lab
§ Using National Institute of Standards and
§ Computer Forensics Lab Floor Plan Ideas
Technology (NIST) Tools
§ Selecting a Basic Forensic Workstation
§ Using National Institute of Justice (NU)
§ Selecting Workstations for Police Labs Methods
6 EC-Council
§ Exploring Ds2dump § Exploring DataLifter
7 EC-Council
§ DIGS § Documenting Evidence
§ Processing and Handling Digital Evidence § Determining the Tools You Need
8 EC-Council
§ Seizing Digital Evidence at the Scene § Using Other Forensics Acquisition Tools
9 EC-Council
§ Setting Up Your Forensic Workstation § Copying an E-mail Message
10 EC-Council
§ Reviewing Lossless and Lossy Compression § Writing Clearly
§ Providing Acknowledgments
§ Types of Reports
11 EC-Council
§ Documenting and Preparing Evidence § Understanding Prosecutorial Misconduct
12 EC-Council
§ What does a CSIRT do? § Passive Detection Methods
§ Scripting
§ Windows Logging
§ ntsyslog
13 EC-Council
§ O&O UnErase § APDFPR
§ Mail Headers
14 EC-Council
§ Tool: R-Mail destination
15 EC-Council
§ FTP logs § Preventing DNS Spoofing
§ Web Based Password Brute Force Attack § Forensic Tools for Network Investigations
§ Ethereal
§ Address Spoofing
16 EC-Council
§ Confiscation of Computer Equipment § System State Backup
17 EC-Council
§ Swap file as evidence § LKM
§ Viewing the Contents of the Swap/Page File § Open Ports and Listening Applications
18 EC-Council
§ Federal Computer Crimes and Laws § What is trade dress?
§ How the FBI Investigates Computer Crime § Using Internet to Search for Trademarks
§ SCO vs IBM
Module 29 Investigating Trademark and
Copyright Infringement § What is Plagiarism?
§ Trademarks § Turnitin
19 EC-Council
International Council of E-Commerce Consultants
67 Wall Street, 22nd Floor
New York, NY 10005-3198
USA
Phone: 212.709.8253
Fax: 212.943.2300
20 EC-Council