Computer Hacker and Forensic Investigator Training
3.6 (400 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,167 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Computer Hacker and Forensic Investigator Training to your Wishlist.

Add to Wishlist

Computer Hacker and Forensic Investigator Training

Learn the skills to identify cyber crime and for Professionals who seek to work with network security and hacking issues
Best Seller
3.6 (400 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,167 students enrolled
Created by CyberTraining 365
Last updated 1/2017
English
Curiosity Sale
Current price: $10 Original price: $160 Discount: 94% off
30-Day Money-Back Guarantee
Includes:
  • 9 hours on-demand video
  • 20 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand the process of investigating cyber-crimes and the laws involved, as well as details in obtaining a search warrant.
  • Understand Different types of digital evidence, rules of evidence, digital evidence examination processes, and electronic crime and digital evidence consideration by crime category.
  • How to recover deleted files and deleted partitions
  • Understand The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, as well as steganalysis, and image file forensics
  • Learn Password cracking concepts, tools, types of password attacks and how to investigate password protected file breaches.
  • Learn different types of log capturing techniques, log management, time synchronization and log capturing tools.
  • How to investigate logs, network traffic, wireless attacks, and web attacks
  • How to track e-mails and investigate e-mail crimes and many more.
View Curriculum
Requirements
  • An interest in investigating cyber crimes!
Description

With this course, a professional can feel confident about his knowledge and ability to analyze any security flaw rising up in the system. This course can help prevailing as well as new professionals to develop an existing and a new career respectively. Computer Hacker and Forensic Investigator is one of the most valued certificates in Network Security and possessing it raises one to an elite group of professionals.

These professionals will be able to find forensic evidences in a neutral perspective. They will also be in a position to determine the vulnerabilities and track the intruders into the systems. 

By attaining this Course , professionals can prove their skill and knowledge in the following fields.

  • Investigation processes in Computer forensics
  • Legal issues involved in investigations
  • Searching evidence and digital handprints
  • Methodologies of Acquisition and seizing
  • Digital evidence, their types, examination processes
  • Electronic crime and their categories
  • Electronic crime scene evaluation, acquiring and conducting primary interviews
  • Electronic evidence preservation and reporting crime scenes
  • Setting up forensic lab in computer
  • Knowledge of windows, linux and mac boot up
  • File systems and their differences, booting a failed hard drive
  • Volatile and non-volatile information gatherings
  • Recover deleted files and hard dusk partitions
  • Steganography, Steganalysis and forensics of image files
  • Concepts of password cracking and investigating password attacks
  • Investigate log files and determining the root cause
  • Access Data FTK expertise
  • Attacks on wireless and related issues
  • E-mail crimes, its investigation and recovery of deleted mails
  • Writing investigative reports


Who is the target audience?
  • All IT professionals involved with information system security, computer forensics, and incident response.
  • Anyone interested in learning about investigating cyber crimes
Students Who Viewed This Course Also Viewed
Curriculum For This Course
98 Lectures
09:01:52
+
Introduction to Computer Forensics
6 Lectures 37:05

This class covers the Introduction to Computer Forensics. This video reviews the various definitions of what computer forensics is. 

Preview 04:57

This class covers the Introduction to Computer Forensics. This video reviews the aspects of Oranizational security such as Physical Security, IT Security, Financial Security, and Legal Security. Along with covering th Objective & Need of Computer Forensics, and the Benefits of Forensics Readiness. 

Preview 06:44

This class covers the Introduction to Computer Forensics. This video reviews the Goals of Forensics Readiness and what Cyber Crime is. Along with covering Modes of Attacks such as Insider Attack, and External Attack, and reviewing examples of Cyber Crime and the organizational chart of Cyber Crime. 

Introduction To Computer Forensics Part 3
04:42

This class covers the Introduction to Computer Forensics. This video reviews the Cyber Crime Investigation, and the Key Steps in a Forensics Investigation.

Introduction To Computer Forensics Part 4
06:09

This class covers the Introduction to Computer Forensics. This video reviews the Role of a Forensics Investigator. Along with understanding a Corporate Investigation, and how the Enterprise Theory of Investigation (ETI) relates to it. This video also discusses reporting results, and the importance of reporting cyber crimes. 

Introduction To Computer Forensics Part 5
04:40

This lab covers the Introduction to Computer Forensics. This video reviews how to report a cyber crime. 

Preview 09:53
+
Computer Forensics Investigation Process
4 Lectures 24:24

This class covers the Computer Forensics Investigation Process. This video reviews the steps of Investigating Computer Crime, what to do before the investigation, how to build a workstation, how to build a team and who should be apart of it. We will also review Policies and law, such as Forensics Law. Next we will review warrants, forensics photography, collecting evidence, and guidelines for securing and managing evidence.

Preview 07:27

This class covers the Computer Forensics Investigation Process. This video reviews Data Analysis, and tools to analyis data. Along with covering Evidence and Case assessment, and the best practices for that. Next we will cover dosumentation in each phase, the importance of gathering and organizing information, how to write the investigation report, who a expert witness is, how to testify in court, and closing the case. We will wrap up with Computer Forensics Service Providers. 

Computer Forensics Investigation Process Part 2
08:31

This lab covers the Computer Forensics Investigation Process. This video reviews how to calculate the hash value of evidence.

LAB : HashMyFiles
03:42

This lab covers the Computer Forensics Investigation Process. This video reviews how to calculate the hash, and to check the file process.

LAB: HashCalc
04:44
+
Searching and Seizing Computers
5 Lectures 19:23

This class covers Searching and Seizing Computers. This video reviews searching and seizing computers without a warrant, and laws and examples that protect individual rights.

Preview 02:47

This class covers Searching and Seizing Computers. This video reviews expectation to the warrant requirement in cases involving computers. Along with covering what is consent and the types such as, third party consent and implied consent. We will also cover exigent circumstances, what plain view is, and search incident to a lawful arrest.

Searching And Seizing Computers Part 2
03:44

This class covers Searching and Seizing Computers. This video reviews searches such as, inventory searches, border searches, workplace searches, and searching and seizing a computer with a warrant. Along with how to have a successful search with a warrant. 

Searching And Seizing Computers Part 3
04:23

This class covers Searching and Seizing Computers. This video reviews the strategies for executing computer searches, what to do when hardware is itself contraband or a storage device for evidence of a crime. We will also review the Privacy Protection Act, the terms and applications that go with it, and the civil liability under the Electronic Communications Privacy Act. 

Searching And Seizing Computers Part 4
04:02

This class covers Searching and Seizing Computers. This video reviews the need for multiple warrants, and types of warrants such as No-Knock warrants and Sneak-and-Peek warrants. Along with covering how to approach privileged documents, and how to draft a warrant and affidavit, and how to defend your warrants against challenges.

Searching And Seizing Computers Part 5
04:27
+
Digital Evidence
5 Lectures 23:40

This class covers Digital Evidence. This video covers what Digital Evidence is, the challenges that face it, the role of it, along with the characteristics, and fragility of it. We will also be reviewing Anti-Digital Forensics, types of digital data, and the rules of evidence. 

Preview 05:23

This class covers Digital Evidence. This video reviews the Federal Rules of Evidence, International Organization on Computer Evidence, and Scientific Working Group on Digital Evidence. Along with covering different types of electronic devices for collecting potential evidence. 

Digital Evidence Part 2
05:14

Digital Evidence Part 3
04:21

This class covers Digital Evidence. This video reviews evidence preservation, evidence examination and analysis, and evidence documenting.

Digital Evidence Part 4
04:21

This class covers Digital Evidence. This video reviews evidence examiner reports, and final report of findings. 

Digital Evidence Part 5
04:21
+
First Responder Person
5 Lectures 26:06

This class covers First Responder Person. This video reviews what electronic evidence is and the role of the first responder. Along with reviewing different electronic devices used to collect evidence from, and the tool kit that the First Responder needs. 

Preview 04:19

This class covers First Responder Person. This video reviews evidence collecting tools and equipment, and the First Responder Rule. Along with reviewing different situations for responses such as, incident response, first response for system administrator, first response by non-laboratory staff, and first response by laboratory staff. 

First Responder Person Part 2
05:08

This class covers First Responder Person. This video reviews securing and evaluating electronic crime scene by knowing what questions to ask, what concent is, obtaining witness signatures, knowing how to conduct preliminary interviews, and documenting the crime scene with photos.

First Responder Person Part 3
05:24

This class covers First Responder Person. This video reviews documenting the crime scene with sketches and videos, along with how to collect and preserve the evidence. We will also address how to deal with powered on/off electronic devices, networked electronic devices, and open files/start up files on electronic devices. 

First Responder Person Part 4
05:42

This class covers First Responder Person. This video reviews computers and servers and how to collect and preserve evidence from them. We will also address how to package electronic evidence and the importance of, exhibit numbers, transporting evidence safely, and what a chain of custody form is and how to fill it out. We will also remind you to have a note taking checklist and review common mistakes made by First Responders. 

First Responder Person Part 5
05:33
+
Computer Forensic Lab
8 Lectures 46:47

This class covers Computer Forensic Lab. This video reviews what a computer forensic lab is, how to plan for it, budget for it, the physical needs of it, and cetain environmental conditions required for it. Along with electronic needs, communication needs, work area needs, and ambiece needed for a Forensics lab. 

Preview 05:03

This class covers Computer Forensic Lab. This video reviews a computer forensic investigator, law enforcement officer, and lab director. We also review Forencsic lab licensing requisite, features needed for imaging systems, auditing a lab, services provided by the lab, and equipment required such as workstations and software. 

Computer Forensic Lab Part 2
06:10

This lab covers how to use Data Lifter to gather evidence. Part 2

LAB 1: Computer Forensic Lab: Data Lifter Part I
06:12

This lab covers how to use Data Lifter to gather evidence. Part 3

LAB 1: Computer Forensic Lab: Data Lifter Part II
06:08

This lab covers how to use Data Lifter to gather evidence. Part 3

LAB 1: Computer Forensic Lab: Data Lifter Part III
06:08

LAB 2: Computer Forensic Lab For P2 Commander Part I
06:00

This lab covers how use P2 Commander to handle evidence. Part 2

LAB 2: Computer Forensic Lab For P2 Commander Part II
05:01

This lab covers how use P2 Commander to handle evidence. Part 3

LAB 2: Computer Forensic Lab For P2 Commander Part III
06:05
+
Understanding HardDisks & file Systems
6 Lectures 32:39

This class covers Understanding Hard Disk & File Systems. This video reviews disk drives, what a Hard Disk Drive is, what a Solid State Drive is, and what the physical structure of a Hard Disk is.

Preview 06:37

This class covers Understanding HardDisk & File Systems. This video reviews types of Hard Disk interfaces, what a disk platter is, what a track is, how tracks numbering works, what a sector is, and how sector addressing works. Along with addressing what slack space, lost clusters, bad sectors, and master boot records are. 

Understanding HardDisks & File Systems Part 2
06:11

This class covers Understanding HardDisk & File Systems. This video reviews essential Windows systems files, the different files systems, what is popular Window files systems, and what File Allocation Table (FAT) is. 

Understanding HardDisks & File Systems Part 3
07:05

This class covers Understanding HardDisk & File Systems. This video reviews Linux files systems, including popular file systems. We will also cover Mac OS X file systems, and review what a RAID storge system is, and the different levels RAID has before wrapping up with reivew The Sleuth Kit (TSK). 

Understanding HardDisks & File Systems Part 4
04:48

This lab covers how to recover deleted files form Hard disk using Linux. 

LAB 1: Understanding HardDisks & File Systems
05:31

This lab covers how to use Procmod, the process monitor, to monitor processes running, operations, and hive details.

LAB 2: Understanding HardDisks & File Systems
02:27
+
Data Aquisition & Duplication
6 Lectures 31:44

This class covers Data Acquisition & Duplication. This video reviews the difference between Static Acquisition and Live Acquisition, along with Data Acquisition formats, bit stream vs. Backups, why to create duplicates, problems that might come up with data duplication, and Data Acquisition methods.

Preview 05:47

This class covers Data Acquisition & Duplication. This video reviews Data Acquisition mistakes, rules of thumb, Static Acquisition and Live Acquisition, why volatile data is important and the mistakes that might come up, along with volatile data collection methods. We will also cover Disk Imaging tool requirements.

CHFI-Computer Hacking Forensic Investigator Module 9.1
05:04

This class covers Data Acquisition & Duplication. This video reviews how to validate Data Acquisitions, what RAID disk are, and remote Data Acquisition. We also cover best practices for Acquisition such as, DD Command, dcfldd Command, extracting the MBR, Encase Forenisc, Image MASSTER: Solo-4 (Super Kit), mage MASSTER: RoadMASSter-3, and Tableau TDI Forensic Duplicator.

CHFI-Computer Hacking Forensic Investigator Module 9.2
04:29

This lab covers how to take a image of the RAM memory using Helux. Part 1

CHFI-Computer Hacking Forensic Investigator Lab 9.0
02:53

This lab covers how to take an image of evidence using Kali. Part 1

CHFI-Computer Hacking Forensic Investigator Lab 9.1
05:21

This lab covers how to take a image of the RAM memory using Helux. Part 2

CHFI-Computer Hacking Forensic Investigator Lab 9.2
08:10
+
Recoving Deleted files & Partitions
3 Lectures 14:36

This class covers Recovering Deleted Files & Partitions. This video reviews what deleted files are, what happens deleted files when you delete them from Windows. We also review what to do with damaged or deleted INFO files, and damaged recycle folder. Then we cover file recovery in Mac OS X and Linux, and some tools that you can use to recover files.

Preview 04:36

This lab covers how to use Stellar Phoenix Windows Data Recovery for data recovery.

CHFI-Computer Hacking Forensic Investigator Lab 10.0
03:14

This lab covers how to partition recovery using MiniTool Power Data Recovery

CHFI-Computer Hacking Forensic Investigator Lab 10.1
06:46
+
Stegnography
8 Lectures 44:38

This class covers Stegnography. This video reviews what steganography is, the legal use, unethical use, techniques, and classification. Along with reviewing the different types of Steganography, we will look more into Technical Steganography, Linguistic Steganography, and Image Steganography.

Preview 05:07

This class covers Stegnography. This video reviews Steganography tools such as S-Tools. We will also review Audio Steganography, methods for Audio Steganography, tools for Audio Steganography such as Mp3stegz. Video Steganography is also reviewed, along with another Steganography tool, MSU. We look at Document Steganography tool, wbStego, Invisible Secrets, and explain the Steganography file system. We end the video explaining Image Files, common terminologies, review vector images, and review raster images.

Stegnography Part 2
07:53

This class covers Stegnography. This video reviews Data Compression, how it works, what lossless compression is, what lossy compression is. Along with reviewing best practices for forensic image, locating and recovering image files, how Hex Workshop works, and some other tools you can use.

Stegnography Part 3
04:44

This lab covers recover photo evidence from a raw file using Adroit Photo Forensics. Part 1

LAB 1: Stegnography
04:59

This lab covers how to recover photo evidence from a raw file using Adroit Photo Forensics. Part 2

LAB 2: Stegnography
06:46

This lab covers how to analysis image file headers using Hex Workshop.

LAB 3: Stegnography
07:53

This lab covers how to perform image analyzer with Stegdetect.

LAB 4: Stegnography
03:58

This lab covers how to do steganography using Quickstego.

LAB 5: Stegnography
03:18
9 More Sections
About the Instructor
CyberTraining 365
4.1 Average rating
2,263 Reviews
44,847 Students
16 Courses
Best Selling Instructor, 30,000+ Students

 Join the Cyber Security Industry in 2017!

Interested in starting a career in the Cyber Security Industry? 2017 is the time! 

Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.   

Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.  

Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself!

About Us:

CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.

CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.