What are the objectives of this course?
The package is split into two courses. The first of these courses are built around the Certified Ethical Hacker certification:
- Understanding ethics involved in white hat hacking.
- How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked.
- How to identify potential vulnerabilities.
- Trojans, backdoors, viruses, worms, and Denial of Service (DoS) attacks.
- The role of social engineering to steal confidential information directly from employees.
- Sniffers and session hijacking
- Web-based attacks
- Wireless network security
- How hackers avoid protective measures like IDS, firewalls, and honeypots.
- Network forensic techniques
- Cryptography and steganography
- How to use the Metasploit toolkit to assess network protection measures.
The second stage of this package is the Computer Hacking Forensic Investigator course and takes students through:
- How to carry out an investigation according to industry best practice principles and legal guidelines.
- Searching and seizing resources required for the investigation.
- Handling Digital Evidence
- First Responder Procedures
- How to fit a forensic lab for investigations.
- Hard Disks and File Systems
- Windows Forensics
- Data Acquisition and Duplication
- Recovering Deleted Files and Partitions
- Using Access Data FTK and Special Steps
- Log Correlation
- Network Forensics
- Wireless Attacks
- Web Attacks
- Email Crimes
- Mobile Resource Investigation
- Investigation Reports
- Expert Witness
Who is it intended for?
This course is best suited to anyone who is looking to gain the necessary knowledge to make a career change in IT security. Or, it is equally able to satisfy the demands of anyone who is looking to better understand hacking techniques so that can protect theirs, or their clients, resources.
There are no pre-requisites for this course.
What marks this course apart?
Once students have completed this course they will be ready to sit their CHFI EC0 312-49 & 312-50 exams. You will have the knowledge to function in roles such as ethical hacker, cybersecurity, penetration tester, and information security analyst.
What happens after requesting information?
Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require.
This school offers programs in:
Last updated November 23, 2017