Book description
This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute.The EC-Council offers certification for ethical hacking and computer forensics. Their ethical hacker exam has become very popular as an industry gauge and we expect the forensics exam to follow suit.
Material is presented in a logical learning sequence: a section builds upon previous sections and a chapter on previous chapters. All concepts, simple and complex, are defined and explained when they appear for the first time. This book includes: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight crucial points, Exam’s Eye View emphasizes the important points from the exam’s perspective, Key Terms present definitions of key terms used in the chapter, Review Questions contains the questions modeled after real exam questions based on the material covered in the chapter. Answers to the questions are presented with explanations. Also included is a full practice exam modeled after the real exam.
- The only study guide for CHFI, provides 100% coverage of all exam objectives.
- CHFI Training runs hundreds of dollars for self tests to thousands of dollars for classroom training.
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Technical Editor
- Contributors
- Chapter 1: Computer Forensics in Today’s World
- Chapter 2: Systems, Disks, and Media
- Chapter 3: The Computer Investigation Process
- Chapter 4: Acquiring Data, Duplicating Data, and Recovering Deleted Files
- Chapter 5: Windows, Linux, and Macintosh Boot Processes
- Chapter 6: Windows and Linux Forensics
- Chapter 7: Steganography and Application Password Crackers
- Chapter 8: Computer-Assisted Attacks and Crimes
- Chapter 9: Investigating Network Traffic and Investigating Logs
- Chapter 10: Router Forensics and Network Forensics
- Chapter 11: Investigating Wireless Attacks
- Chapter 12: PDA, Blackberry, and iPod Forensics
- Chapter 13: Forensic Software and Hardware
- Chapter 14: Forensics Investigation Using EnCase
- Chapter 15: Incident Response
- Chapter 16: Types of Investigations
- Appendix A: Becoming an Expert Witness
- Appendix B: Worldwide Forensic Acts and Laws
- Index
Product information
- Title: The Official CHFI Study Guide (Exam 312-49)
- Author(s):
- Release date: August 2011
- Publisher(s): Syngress
- ISBN: 9780080555713
You might also like
book
CISSP Practice Questions Exam Cram, Second Edition
Master Your Knowledge of the CISSP Exam! Features more than 500 questions, organized to reflect the …
book
Detecting and Combating Malicious Email
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, …
book
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the …
book
Noiseless Steganography
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its …