Computer Hacking Forensic Investigator (ECCHFI)
(IZI-ECCHFI.AB1)
Skills You’ll Get
Interactive Lessons
11+ Interactive Lessons | 95+ Quizzes | 418+ Flashcards | 418+ Glossary of terms
Gamified TestPrep
119+ Pre Assessment Questions | 119+ Post Assessment Questions |
Hands-On Labs
34+ LiveLab | 42+ Video tutorials | 36+ Minutes
The Scope of Digital Forensics
- Popular Myths about Computer Forensics
- Types of Digital Forensic Evidence Recovered
- What Skills Must a Digital Forensics Investigator Possess?
- The Importance of Digital Forensics
- Job Opportunities
- A History of Digital Forensics
- Training and Education
- Summary
Online Investigations
- Working Undercover
- Dark Web Investigations
- Virtual Currencies
- Website Evidence
- Background Searches on a Suspect
- Online Crime
- Capturing Online Communications
- Edge Web Browser
- Summary
Documenting the Investigation
- Obtaining Evidence from a Service Provider
- Documenting a Crime Scene
- Seizing Evidence
- Documenting the Evidence
- Using Tools to Document an Investigation
- Writing Reports
- Using Expert Witnesses at Trial
- Summary
Admissibility of Digital Evidence
- History and Structure of the United States Legal System
- Evidence Admissibility
- Constitutional Law
- When Computer Forensics Goes Wrong
- Structure of the Legal System in the European Union (E.U.)
- Privacy Legislation in Asia
- Summary
Acquiring Evidence in a Computer Forensics Lab
- Lab Requirements
- Private-Sector Computer Forensics Laboratories
- Computer Forensics Laboratory Requirements
- Extracting Evidence from a Device
- Skimmers
- Steganography
- Summary
Windows Operating and File Systems
- Physical and Logical Storage
- Paging
- File Conversion and Numbering Formats
- Operating Systems
- Windows Registry
- Microsoft Office
- Microsoft Windows Features
- Summary
Photograph Forensics
- National Center for Missing and Exploited Children (NCMEC)
- Project VIC
- Case Studies
- Understanding Digital Photography
- Examining Picture Files
- Evidence Admissibility
- Case Studies
- Summary
Network Forensics and Incident Response
- The Tools of the Trade
- Networking Devices
- Understanding the OSI Model
- Introduction to VoIP
- Incident Response (IR)
- STIX, TAXII, and Cybox
- Advanced Persistent Threats
- Investigating a Network Attack
- Summary
Internet of Things (IoT) Forensics and Emergent Technologies
- 5G
- Wi-Fi 6
- Wi-Fi Mesh Networks
- Shodan
- Mirai Botnet
- Cryptocurrency Mining
- Alexa
- Micro-Chipping
- Fitness Trackers
- Apple Watch
- Action Cameras
- Police Safety
- Police Vehicles
- Vehicle Forensics
- Low-Tech Solution for High-Tech Seizures
- Summary
Mobile Forensics
- The Cellular Network
- Handset Specifications
- Mobile Operating Systems
- Standard Operating Procedures for Handling Handset Evidence
- Handset Forensics
- Manual Cellphone Examinations
- Global Satellite Service Providers
- Legal Considerations
- Other Mobile Devices
- Documenting the Investigation
- Summary
Mobile App Investigations
- Static Versus Dynamic Analysis
- Dating Apps
- Rideshare Apps
- Communication Apps
- Summary
The Scope of Digital Forensics
- Displaying Metadata Information
Online Investigations
- Using MBSA
- Using a Numeric IP Address to Locate a Web Server
Acquiring Evidence in a Computer Forensics Lab
- Using GREP
- Using the dd Utility
Windows Operating and File Systems
- Enabling the Peek Performance Option
- Using a Hex Editor
- Converting an NTFS Partition to FAT32 Using Disk Management
- Converting a FAT32 Partition to NTFS Using Command Prompt
- Converting a FAT32 Partition to NTFS Using Disk Management
- Using FTK Imager
- Exploring Windows File Registry
- Using the Event Viewer
- Using the Disk Defragmenter
Network Forensics and Incident Response
- Analyzing Traffic Captured from Site Survey Software
- Using NetWitness Investigator
- Capturing Packets Using Wireshark
- Using TCPdump
- Finding a MAC Address of a System
- Using the tracert Command
- Getting Information about DNS (Layer 4)
- Obtaining Information about the Net Firewall Profile
- Obtaining IP Route Information from the IP Routing Table
- Obtaining Information about an IP Version
- Obtaining an IP version of a Network Adapter
- Getting Information about UDP Ports
- Getting Information about the Current Connection Statistics of UDP
- Getting Settings of UDP
- Getting Information about TCP Ports
- Getting Information about the Current Connection Statistics of TCP
- Getting the Settings of TCP
Mobile Forensics
- Setting Up a VPN in Android
- Configuring an Email in Android
- Removing an Account from Android