Welcome to Expert Training The Online Course Shop!
-40%

Computer Hacking Forensic Investigator v9 (CHFI v9) Course & LAB Tools

$15.00

Price: 15.00 USD |  Size : 24.3 GB | Duration : 20 Hours | 100+ Video Lessons | ENGLISH | 

BRAND:

Bonus :  E-Courseware LAB Manuals And Tools | INSTANT DOWNLOAD   |⭐️⭐️⭐️⭐️⭐️ 4.9 

OR

Description

Price: 15.00 USD |  Size : 24.3 GB | Duration : 20 Hours | 100+ Video Lessons | ENGLISH | 

Bonus :  E-Courseware LAB Manuals And Tools | INSTANT DOWNLOAD   |⭐️⭐️⭐️⭐️⭐️ 4.9 

 

Computer Hacking Forensic Investigator v9 (CHFI v9) Video Course E-Courseware LAB Manuals And Tools (24.2 GB)

Module 1: Computer Forensics Introduction

 

1.0 Intro to Course Pt. 1

 

1.1 Intro to Course Pt. 2

 

1.2 Intro to Course Pt. 3

 

1.3 Intro to Course Pt. 4

 

1.4 Intro to Course Pt. 5

 

1.5 Intro to Forensics Pt. 1

 

1.6 Intro to Forensics Pt. 2

 

1.7 Intro to Forensics Pt. 3

 

1.8 Intro to Forensics Pt. 4

 

1.9 Intro to Forensics Pt. 5

 

1.10 Intro to Forensics Pt. 6

 

1.11 Intro to Forensics Pt. 7

 

1.12 Intro to Forensics Pt. 8

 

Module 2: Forensics Investigation Process

 

2.0 Forensics Investigation Process Pt. 1

 

2.1 Forensics Investigation Process Pt. 2

 

2.2 Forensics Investigation Process Pt. 3

 

2.3 Forensics Investigation Process Pt. 4

 

2.4 Forensics Investigation Process Pt. 5

 

2.5 Forensics Investigation Process Pt. 6

 

2.6 Forensics Investigation Process Pt. 7

 

2.7 Forensics Investigation Process Pt. 8

 

2.8 Forensics Investigation Process Pt. 9

 

2.9 Forensics Investigation Process Pt. 10

 

Module 3: Searching and Seizing

 

3.0 Searching and Seizing Pt. 1

 

3.1 Searching and Seizing Pt. 2

 

3.2 Searching and Seizing Pt. 3

 

3.3 Searching and Seizing Pt. 4

 

3.4 Searching and Seizing Pt. 5

 

Module 4: Digital Evidence

 

4.0 Digital Evidence Pt. 1

 

4.1 Digital Evidence Pt. 2

 

4.2 Digital Evidence Pt. 3

 

4.3 Digital Evidence Pt. 4

 

4.4 Digital Evidence Pt. 5

 

4.5 Digital Evidence Pt. 6

 

4.6 Digital Evidence Pt. 7

 

Module 5: First Responder Procedures

 

5.0 First Responder Procedures Pt. 1

 

5.1 First Responder Procedures Pt. 2

 

5.2 First Responder Procedures Pt. 3

 

5.3 First Responder Procedures Pt. 4

 

5.4 First Responder Procedures Pt. 5

 

5.5 First Responder Procedures Pt. 6

 

5.6 First Responder Procedures Pt. 7

 

5.7 First Responder Procedures Pt. 8

 

Module 6: Forensics Lab

 

6.0 Forensic Lab Pt. 1

 

6.1 Forensic Lab Pt. 2

 

6.2 Forensic Lab Pt. 3

 

6.3 Forensic Lab Pt. 4

 

6.4 Forensic Lab Pt. 5

 

Module 7: Hard Disks and File Systems

 

7.0 Hard Disks and File Systems Pt. 1

 

7.1 Hard Disks and File Systems Pt. 2

 

7.2 Hard Disks and File Systems Pt. 3

 

7.3 Hard Disks and File Systems Pt. 4 

 

7.4 Hard Disks and File Systems Pt. 5

 

7.5 Hard Disks and File Systems Pt. 6

 

7.6 Hard Disks and File Systems Pt. 7

 

7.7 Hard Disks and File Systems Pt. 8

 

7.8 Hard Disks and File Systems Pt. 9

 

7.9 Hard Disks and File Systems Pt. 10

 

Module 8: Windows Forensics

 

8.0 Windows Forensics Pt. 1

 

8.1 Windows Forensics Pt. 2

 

8.2 Windows Forensics Pt. 3

 

8.3 Windows Forensics Pt. 4

 

8.4 Windows Forensics Pt. 5

 

8.5 Windows Forensics Pt. 6

 

8.6 Windows Forensics Pt. 7

 

8.7 Windows Forensics Pt. 8

 

8.8 Windows Forensics Pt. 9

 

8.9 Windows Forensics Pt. 10

 

Module 9: Data Acquisition and Duplication

 

9.0 Data Acquisition and Duplication Pt. 1

 

9.1 Data Acquisition and Duplication Pt. 2

 

9.2 Data Acquisition and Duplication Pt. 3

 

9.3 Data Acquisition and Duplication Pt. 4

 

9.4 Data Acquisition and Duplication Pt. 5

 

9.5 Data Acquisition and Duplication Pt. 6

 

9.6 Data Acquisition and Duplication Pt. 7

 

Module 10: Recovering Deleted Files and Partitions

 

10.0 Recovering Deleted Files and Partitions Pt. 1

 

10.1 Recovering Deleted Files and Partitions Pt. 2

 

Module 11: Using Access Data FTK

 

11.0 Using Access Data FTK and Special Steps Pt. 1

 

11.1 Using Access Data FTK and Special Steps Pt. 2

 

11.2 Using Access Data FTK and Special Steps Pt. 3

 

11.3 Using Access Data FTK and Special Steps Pt. 4

 

11.4 Using Access Data FTK and Special Steps Pt. 5

 

11.5 Using Access Data FTK and Special Steps Pt. 6

 

11.6 Using Access Data FTK and Special Steps Pt. 7

 

11.7 Using Access Data FTK and Special Steps Pt. 8

 

Module 12: Using EnCase

 

12.0 EnCase Pt. 1

 

12.1 EnCase Pt. 2

 

12.2 EnCase Pt. 3

 

Module 13: Steganography

 

13.0 Stenography Pt. 1

 

13.1 Stenography Pt. 2

 

13.2 Stenography Pt. 3

 

13.3 Stenography Pt. 4

 

Module 14: Password Crackers

 

14.0 Passwords Pt. 1

 

14.1 Passwords Pt. 2

 

14.2 Passwords Pt. 3

 

14.3 Passwords Pt. 4

 

Module 15: Log Correlation

 

15.0 Log Correlation Pt. 1

 

15.1 Log Correlation Pt. 2

 

15.2 Log Correlation Pt. 3

 

15.3 Log Correlation Pt. 4

 

15.4 Log Correlation Pt. 5

 

15.5 Log Correlation Pt. 6

 

Module 16: Network Forensics

 

16.0 Network Forensics Pt. 1

 

16.1 Network Forensics Pt. 2

 

16.2 Network Forensics Pt. 3

 

16.3 Network Forensics Pt. 4

 

Module 17: Wireless Attacks

 

17.0 Wireless Attacks Pt. 1

 

17.1 Wireless Attacks Pt. 2

 

17.2 Wireless Attacks Pt. 3

 

Module 18: Web Attacks

 

18.0 Web Attacks Pt. 1

 

18.1 Web Attacks Pt. 2

 

18.2 Web Attacks Pt. 3

 

18.3 Web Attacks Pt. 4

 

18.4 Web Attacks Pt. 5

 

18.5 Web Attacks Pt. 6

 

18.6 Web Attacks Pt. 7

 

18.7 Web Attacks Pt. 8

 

Computer Hacking Forensic Investigator – CHFI v9 – Courseware

Computer Hacking Forensic Investigator – CHFI v9 – Instructor Slides

Computer Hacking Forensic Investigator – CHFI v9 – Lab Manuals

Essential Tools 5.29 GB

Additional Tools 10.8 GB

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

×
×

Cart