O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Computer Hacking Forensic Investigator (CHFI)

Video Description

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Table of Contents

  1. Module 1: Computer Forensics Introduction
    1. Intro to Course Pt. 1 00:05:32
    2. Intro to Course Pt. 2 00:07:40
    3. Intro to Course Pt. 3 00:05:38
    4. Intro to Course Pt. 4 00:12:14
    5. Intro to Course Pt. 5 00:06:45
    6. Intro to Forensics Pt. 1 00:03:08
    7. Intro to Forensics Pt. 2 00:12:03
    8. Intro to Forensics Pt. 3 00:09:07
    9. Intro to Forensics Pt. 4 00:04:23
    10. Intro to Forensics Pt. 5 00:04:58
    11. Intro to Forensics Pt. 6 00:09:12
    12. Intro to Forensics Pt. 7 00:12:11
    13. Intro to Forensics Pt. 8 00:05:37
  2. Module 2: Forensics Investigation Process
    1. Forensics Investigation Process Pt. 1 00:09:12
    2. Forensics Investigation Process Pt. 2 00:03:32
    3. Forensics Investigation Process Pt. 3 00:09:18
    4. Forensics Investigation Process Pt. 4 00:11:03
    5. Forensics Investigation Process Pt. 5 00:08:10
    6. Forensics Investigation Process Pt. 6 00:03:02
    7. Forensics Investigation Process Pt. 7 00:03:26
    8. Forensics Investigation Process Pt. 8 00:11:39
    9. Forensics Investigation Process Pt. 9 00:08:24
    10. Forensics Investigation Process Pt. 10 00:09:29
  3. Module 3: Searching and Seizing
    1. Searching and Seizing Pt. 1 00:09:06
    2. Searching and Seizing Pt. 2 00:06:49
    3. Searching and Seizing Pt. 3 00:09:20
    4. Searching and Seizing Pt. 4 00:09:00
    5. Searching and Seizing Pt. 5 00:11:10
  4. Module 4: Digital Evidence
    1. Digital Evidence Pt. 1 00:04:17
    2. Digital Evidence Pt. 2 00:10:22
    3. Digital Evidence Pt. 3 00:05:47
    4. Digital Evidence Pt. 4 00:14:20
    5. Digital Evidence Pt. 5 00:06:20
    6. Digital Evidence Pt. 6 00:08:29
    7. Digital Evidence Pt. 7 00:07:33
  5. Module 5: First Responder Procedures
    1. First Responder Procedures Pt. 1 00:11:16
    2. First Responder Procedures Pt. 2 00:13:30
    3. First Responder Procedures Pt. 3 00:09:44
    4. First Responder Procedures Pt. 4 00:06:50
    5. First Responder Procedures Pt. 5 00:07:54
    6. First Responder Procedures Pt. 6 00:06:29
    7. First Responder Procedures Pt. 7 00:08:21
    8. First Responder Procedures Pt. 8 00:07:00
  6. Module 6: Forensics Lab
    1. Forensic Lab Pt. 1 00:10:43
    2. Forensic Lab Pt. 2 00:11:04
    3. Forensic Lab Pt. 3 00:07:04
    4. Forensic Lab Pt. 4 00:11:36
    5. Forensic Lab Pt. 5 00:11:11
  7. Module 7: Hard Disks and File Systems
    1. Hard Disks and File Systems Pt. 1 00:11:15
    2. Hard Disks and File Systems Pt. 2 00:06:54
    3. Hard Disks and File Systems Pt. 3 00:03:44
    4. Hard Disks and File Systems Pt. 4 00:04:25
    5. Hard Disks and File Systems Pt. 5 00:07:06
    6. Hard Disks and File Systems Pt. 6 00:07:12
    7. Hard Disks and File Systems Pt. 7 00:08:45
    8. Hard Disks and File Systems Pt. 8 00:04:47
    9. Hard Disks and File Systems Pt. 9 00:04:54
    10. Hard Disks and File Systems Pt. 10 00:12:16
  8. Module 8: Windows Forensics
    1. Windows Forensics Pt. 1 00:16:01
    2. Windows Forensics Pt. 2 00:03:50
    3. Windows Forensics Pt. 3 00:06:41
    4. Windows Forensics Pt. 4 00:15:30
    5. Windows Forensics Pt. 5 00:15:54
    6. Windows Forensics Pt. 6 00:10:37
    7. Windows Forensics Pt. 7 00:11:51
    8. Windows Forensics Pt. 8 00:08:41
    9. Windows Forensics Pt. 9 00:05:23
    10. Windows Forensics Pt. 10 00:06:44
  9. Module 9: Data Acquisition and Duplication
    1. Data Acquisition and Duplication Pt. 1 00:11:47
    2. Data Acquisition and Duplication Pt. 2 00:07:22
    3. Data Acquisition and Duplication Pt. 3 00:08:56
    4. Data Acquisition and Duplication Pt. 4 00:06:16
    5. Data Acquisition and Duplication Pt. 5 00:10:18
    6. Data Acquisition and Duplication Pt. 6 00:02:38
    7. Data Acquisition and Duplication Pt. 7 00:09:08
  10. Module 10: Recovering Deleted Files and Partitions
    1. Recovering Deleted Files and Partitions Pt. 1 00:10:07
    2. Recovering Deleted Files and Partitions Pt. 2 00:08:39
  11. Module 11: Using Access Data FTK
    1. Using Access Data FTK and Special Steps Pt. 1 00:09:31
    2. Using Access Data FTK and Special Steps Pt. 2 00:05:51
    3. Using Access Data FTK and Special Steps Pt. 3 00:03:49
    4. Using Access Data FTK and Special Steps Pt. 4 00:03:22
    5. Using Access Data FTK and Special Steps Pt. 5 00:03:50
    6. Using Access Data FTK and Special Steps Pt. 6 00:02:43
    7. Using Access Data FTK and Special Steps Pt. 7 00:07:02
    8. Using Access Data FTK and Special Steps Pt. 8 00:04:12
  12. Module 12: Using EnCase
    1. EnCase Pt. 1 00:05:48
    2. EnCase Pt. 2 00:05:35
    3. EnCase Pt. 3 00:06:46
  13. Module 13: Steganography
    1. Stenography Pt. 1 00:08:46
    2. Stenography Pt. 2 00:05:44
    3. Stenography Pt. 3 00:09:37
    4. Stenography Pt. 4 00:14:18
  14. Module 14: Password Crackers
    1. Passwords Pt. 1 00:10:14
    2. Passwords Pt. 2 00:13:39
    3. Passwords Pt. 3 00:10:14
    4. Passwords Pt. 4 00:07:54
  15. Module 15: Log Correlation
    1. Log Correlation Pt. 1 00:13:49
    2. Log Correlation Pt. 2 00:15:59
    3. Log Correlation Pt. 3 00:07:55
    4. Log Correlation Pt. 4 00:05:26
    5. Log Correlation Pt. 5 00:10:40
    6. Log Correlation Pt. 6 00:06:05
  16. Module 16: Network Forensics
    1. Network Forensics Pt. 1 00:05:26
    2. Network Forensics Pt. 2 00:09:47
    3. Network Forensics Pt. 3 00:13:19
    4. Network Forensics Pt. 4 00:02:33
  17. Module 17: Wireless Attacks
    1. Wireless Attacks Pt. 1 00:10:50
    2. Wireless Attacks Pt. 2 00:11:11
    3. Wireless Attacks Pt. 3 00:06:20
  18. Module 18: Web Attacks
    1. Web Attacks Pt. 1 00:11:25
    2. Web Attacks Pt. 2 00:11:39
    3. Web Attacks Pt. 3 00:03:54
    4. Web Attacks Pt. 4 00:08:03
    5. Web Attacks Pt. 5 00:08:47
    6. Web Attacks Pt. 6 00:04:26
    7. Web Attacks Pt. 7 00:03:12
    8. Web Attacks Pt. 8 00:13:48
  19. Module 19: Email Crimes
    1. Email Crimes Pt. 1 00:06:08
    2. Email Crimes Pt. 2 00:04:40
    3. Email Crimes Pt. 3 00:05:18
    4. Email Crimes Pt. 4 00:07:29
  20. Module 20: Mobile Investigation
    1. Mobile Investigation Pt. 1 00:11:34
    2. Mobile Investigation Pt. 2 00:05:23
    3. Mobile Investigation Pt. 3 00:10:24
    4. Mobile Investigation Pt. 4 00:08:38
    5. Mobile Investigation Pt. 5 00:08:38
  21. Module 21: Investigative Reports
    1. Investigation Reports Pt. 1 00:07:53
    2. Investigation Reports Pt. 2 00:09:07
    3. Investigation Reports Pt. 3 00:11:13
    4. Investigation Reports Pt. 4 00:05:29
  22. Module 22: Expert Witness
    1. Expert Witness Pt. 1 00:05:16
    2. Expert Witness Pt. 2 00:12:24
    3. Expert Witness Pt. 3 00:14:38