iCollege – Computer Hacking Forensic Investigator (CHFI) ویدئو جرم شناسی رایانه ای

علم جرم شناسی رایانه ای (به عنوان شاخه ای از جرم شناسی دیجیتال) به شواهد و مدارک قانونی موجود در رایانه ها و محیط های دیجیتالی ذخیره سازی اطلاعات می پردازد. هدف جرم شناسی دیجیتال، ارائه توضیح پیرامون وضعیت فعلی یک ابزار دیجیتالی مثل سیستم کامپیوتر، رسانه ذخیره سازی (مثل دیسک سخت یا CD-ROM) یک سند الکترونیکی (مثل یک پیام ایمیل یا تصویر JPEG) می باشد. گستره فعالیت یک تحلیل جرم شناسی، از بازیابی اطلاعات ساده تا بازسازی یک سری رویداد را دربرمی گیرد. سنجش های خاصی برای انجام تحقیقات جرم شناسی وجود دارد که نتایج آن می تواند در دادگاه مورد استفاده قرار گیرد. هدف تکنیک های جرم شناسی رایانه ای، جستجو، حفظ و آنالیز اطلاعات موجود بر روی سیستم های کامپیوتری به منظور یافتن شواهد و مدارک احتمالی برای یک دادرسی است.

لینک دانلود

 دانلود iCollege – Computer Hacking Forensic Investigator (CHFI)

حجم: 3.11 گیگابایت

دانلود بخش اول
دانلود بخش دوم
دانلود بخش سوم
دانلود بخش چهارم
رمز فایل: technet24.ir

iCollege – Computer Hacking Forensic Investigator (CHFI)

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. Th course includes:

Intro to Forensics, Forensics Investigation Process, Searching and Seizing, Digital Evidence, First Responder Procedures, Forensic Lab, Hard Disks and File Systems, Windows Forensics, Data Acquisition and Duplication, Recovering Deleted Files and Partitions, Using Access Data FTK and Special Steps, EnCase, Stenography, Passwords, Log Correlation, Network Forensics, Wireless Attacks, Web Attacks, Email Crimes , Mobile Investigation, Investigation Reports , Expert Witness.

Who is the target audience?

Anyone who wants to become certified as a Computer Hacking Forensic Investigator.
Science & Technology Professionals

Module 1: Computer Forensics Introduction

1.0 Intro to Course Pt. 1
1.1 Intro to Course Pt. 2
1.2 Intro to Course Pt. 3
1.3 Intro to Course Pt. 4
1.4 Intro to Course Pt. 5
1.5 Intro to Forensics Pt. 1
1.6 Intro to Forensics Pt. 2
1.7 Intro to Forensics Pt. 3
1.8 Intro to Forensics Pt. 4
1.9 Intro to Forensics Pt. 5
1.10 Intro to Forensics Pt. 6
1.11 Intro to Forensics Pt. 7
1.12 Intro to Forensics Pt. 8

Module 2: Forensics Investigation Process

2.0 Forensics Investigation Process Pt. 1

2.1 Forensics Investigation Process Pt. 2

2.2 Forensics Investigation Process Pt. 3

2.3 Forensics Investigation Process Pt. 4

2.4 Forensics Investigation Process Pt. 5

2.5 Forensics Investigation Process Pt. 6

2.6 Forensics Investigation Process Pt. 7

2.7 Forensics Investigation Process Pt. 8

2.8 Forensics Investigation Process Pt. 9

2.9 Forensics Investigation Process Pt. 10

Module 3: Searching and Seizing

3.0 Searching and Seizing Pt. 1

3.1 Searching and Seizing Pt. 2

3.2 Searching and Seizing Pt. 3

3.3 Searching and Seizing Pt. 4

3.4 Searching and Seizing Pt. 5

Module 4: Digital Evidence

4.0 Digital Evidence Pt. 1

4.1 Digital Evidence Pt. 2

4.2 Digital Evidence Pt. 3

4.3 Digital Evidence Pt. 4

4.4 Digital Evidence Pt. 5

4.5 Digital Evidence Pt. 6

4.6 Digital Evidence Pt. 7

Module 5: First Responder Procedures

5.0 First Responder Procedures Pt. 1

5.1 First Responder Procedures Pt. 2

5.2 First Responder Procedures Pt. 3

5.3 First Responder Procedures Pt. 4

5.4 First Responder Procedures Pt. 5

5.5 First Responder Procedures Pt. 6

5.6 First Responder Procedures Pt. 7

5.7 First Responder Procedures Pt. 8

Module 6: Forensics Lab

6.0 Forensic Lab Pt. 1

6.1 Forensic Lab Pt. 2

6.2 Forensic Lab Pt. 3

6.3 Forensic Lab Pt. 4

6.4 Forensic Lab Pt. 5

Module 7: Hard Disks and File Systems

7.0 Hard Disks and File Systems Pt. 1

7.1 Hard Disks and File Systems Pt. 2

7.2 Hard Disks and File Systems Pt. 3

7.3 Hard Disks and File Systems Pt. 4

7.4 Hard Disks and File Systems Pt. 5

7.5 Hard Disks and File Systems Pt. 6

7.6 Hard Disks and File Systems Pt. 7

7.7 Hard Disks and File Systems Pt. 8

7.8 Hard Disks and File Systems Pt. 9

7.9 Hard Disks and File Systems Pt. 10

Module 8: Windows Forensics

8.0 Windows Forensics Pt. 1

8.1 Windows Forensics Pt. 2

8.2 Windows Forensics Pt. 3

8.3 Windows Forensics Pt. 4

8.4 Windows Forensics Pt. 5

8.5 Windows Forensics Pt. 6

8.6 Windows Forensics Pt. 7

8.7 Windows Forensics Pt. 8

8.8 Windows Forensics Pt. 9

8.9 Windows Forensics Pt. 10

Module 9: Data Acquisition and Duplication

9.0 Data Acquisition and Duplication Pt. 1

9.1 Data Acquisition and Duplication Pt. 2

9.2 Data Acquisition and Duplication Pt. 3

9.3 Data Acquisition and Duplication Pt. 4

9.4 Data Acquisition and Duplication Pt. 5

9.5 Data Acquisition and Duplication Pt. 6

9.6 Data Acquisition and Duplication Pt. 7

Module 10: Recovering Deleted Files and Partitions

10.0 Recovering Deleted Files and Partitions Pt. 1

10.1 Recovering Deleted Files and Partitions Pt. 2

Module 11: Using Access Data FTK

11.0 Using Access Data FTK and Special Steps Pt. 1

11.1 Using Access Data FTK and Special Steps Pt. 2

11.2 Using Access Data FTK and Special Steps Pt. 3

11.3 Using Access Data FTK and Special Steps Pt. 4

11.4 Using Access Data FTK and Special Steps Pt. 5

11.5 Using Access Data FTK and Special Steps Pt. 6

11.6 Using Access Data FTK and Special Steps Pt. 7

11.7 Using Access Data FTK and Special Steps Pt. 8

Module 12: Using EnCase

12.0 EnCase Pt. 1

12.1 EnCase Pt. 2

12.2 EnCase Pt. 3

Module 13: Steganography

13.0 Stenography Pt. 1

13.1 Stenography Pt. 2

13.2 Stenography Pt. 3

13.3 Stenography Pt. 4

Module 14: Password Crackers

14.0 Passwords Pt. 1

14.1 Passwords Pt. 2

14.2 Passwords Pt. 3

14.3 Passwords Pt. 4

Module 15: Log Correlation

15.0 Log Correlation Pt. 1

15.1 Log Correlation Pt. 2

15.2 Log Correlation Pt. 3

15.3 Log Correlation Pt. 4

15.4 Log Correlation Pt. 5

15.5 Log Correlation Pt. 6

Module 16: Network Forensics

16.0 Network Forensics Pt. 1

16.1 Network Forensics Pt. 2

16.2 Network Forensics Pt. 3

16.3 Network Forensics Pt. 4

Module 17: Wireless Attacks

17.0 Wireless Attacks Pt. 1

17.1 Wireless Attacks Pt. 2

17.2 Wireless Attacks Pt. 3

Module 18: Web Attacks

18.0 Web Attacks Pt. 1

18.1 Web Attacks Pt. 2

18.2 Web Attacks Pt. 3

18.3 Web Attacks Pt. 4

18.4 Web Attacks Pt. 5

18.5 Web Attacks Pt. 6

18.6 Web Attacks Pt. 7

18.7 Web Attacks Pt. 8

Module 19: Email Crimes

19.0 Email Crimes Pt. 1

19.1 Email Crimes Pt. 2

19.2 Email Crimes Pt. 3

19.3 Email Crimes Pt. 4

Module 20: Mobile Investigation

20.0 Mobile Investigation Pt. 1

20.1 Mobile Investigation Pt. 2

20.2 Mobile Investigation Pt. 3

20.3 Mobile Investigation Pt. 4

20.4 Mobile Investigation Pt. 5

Module 21: Investigative Reports

21.0 Investigation Reports Pt. 1

21.1 Investigation Reports Pt. 2

21.2 Investigation Reports Pt. 3

21.3 Investigation Reports Pt. 4

Module 22: Expert Witness

22.0 Expert Witness Pt. 1

22.1 Expert Witness Pt. 2

22.2 Expert Witness Pt. 3

دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.