Cyber Security Package
eTrain
Summary
- Exam(s) / assessment(s) is included in price
- Tutor is available to students
Overview
If a breach has occurred within your organisation, it falls to the Cyber Forensic Investigators to piece the puzzle together and try to determine who was responsible. Using techniques akin to that of detectives and crime scene investigators, you will follow any clues and use evidence to solve cyber-crimes.
A Forensic Investigator will work with law enforcement agencies, or private firms, to retrieve information from computers and other types of storage devices. They use this information to gather evidence which will be used to bring cyber criminals to justice. Professionals can also test the security of organisation’s information systems to protect from cyber-attacks while tracking down any previous attempts that were made.
This bundle has been put together to teach you the skills required to analyse a breach to find the culprit, and how to manage the incident, as taught in the Certified Incident Handler course. We have combined two of EC-Council’s most prestigious certifications to make you exceptionally useful in reverse engineering a hack or breach to catch those responsible.
- Computer Hacking Forensic Investigator (CHFIv9)
- Certified Incident Handler (ECIH)
The CHFI and ECIH qualifications are two of the most revered in the information security industry and in the EC-Council’s selection, which is why we’ve combined both to give you a complete learning solution for any aspiring Cyber Forensic Investigator.
Description
KEY LEARNING POINTS
Certified Incident Handler:
- Introduction to Incident Response and Handling
- Risk Assessment
- Incident Response and Handling Steps
- CSIRT
- Handling Network Security Incidents
- Handling Malicious Code Incidents
- Handling Insider Threats
- Forensic Analysis and Incident Response
- Incident Reporting
- Incident Recovery
- Security Policies and Laws
Computer Hacking Forensic Investigator:
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Operating System Forensic
- Defeating Anti-Forensics Techniques
- Data Acquisition and Duplication
- Network Forensics
- Investigating Web Attacks
- Database Forensics
- Cloud Forensics
- Malware Forensics
- Investigating Email Crimes
- Mobile Forensics
- Investigative Reports
ADVANTAGES OF THIS COURSE
- Two globally recognised information security qualifications
- Track down cyber-criminals and hackers with the right tools and techniques
- Both courses are loaded with hands-on learning. ILabs are a cloud-based virtual lab, which approximately 50% of the learning time is devoted to
- 24/7 access to course content for 12 months
- Units of Study
Computer Hacking Forensic Investigator (CHFIv9)
Certified Incident Handler (ECIH)
Questions and answers
Good Sir. I am interested in this course what are the reuirements and mode of payments . Best regards A.Joseph
Answer:Hi, You can purchase this course through reed. Regards, eTrain
This was helpful.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.