Dallas-Ft Worth, TX
El Paso, TX
Kansas City, MO
Los Angeles, CA
New York, NY
|Pittsburgh, PA||07/08-07/12||Calgary, AB||07/08-07/12||Columbus, OH||07/08-07/12||Kansas City, MO||07/08-07/12||Omaha, NE||07/08-07/12||Ottawa, ON||07/08-07/12||Oklahoma City, OK||07/08-07/12||Sacramento, CA||07/08-07/12||San Francisco, CA||07/08-07/12||Toronto, ON||07/08-07/12||Tulsa, OK||07/08-07/12||Vancouver, BC||07/08-07/12||Virtual Classroom||07/08-07/12||Wash Metro Area, DC||07/08-07/12||Baltimore, MD||07/08-07/12||Richmond, VA||07/08-07/12||Denver, CO||07/08-07/12||Parsippany, NJ||07/08-07/12||Framingham, MA||07/08-07/12||Chicago, IL||07/08-07/12||Pittsburgh, PA||10/28-11/01||Calgary, AB||10/28-11/01||Columbus, OH||10/28-11/01||Kansas City, MO||10/28-11/01||Omaha, NE||10/28-11/01||Ottawa, ON||10/28-11/01||Oklahoma City, OK||10/28-11/01||Sacramento, CA||10/28-11/01||San Francisco, CA||10/28-11/01||Toronto, ON||10/28-11/01||Tulsa, OK||10/28-11/01||Vancouver, BC||10/28-11/01||Virtual Classroom||10/28-11/01||Wash Metro Area, DC||10/28-11/01||Baltimore, MD||10/28-11/01||Richmond, VA||10/28-11/01||Denver, CO||10/28-11/01||Parsippany, NJ||10/28-11/01||Framingham, MA||10/28-11/01||Chicago, IL||10/28-11/01|
[ Select a date to register ]
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client's systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you. The CHFI is a very advanced security-training program. Proper preparation is required before conducting the CHFI class.
5 Days/Lecture & Lab
This course is intended for many audiences, including the following:-Forensic Investigators-System Administrators-Programmers-Students-IT Security Professionals-IT Managers
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.
Last Update: May 18, 2013