NTUC LearningHub

Course Objectives

 

The program is designed for IT professionals involved with information system security, computer forensics, and incident response. It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defence forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.

Skills that Participants will Gain from this Course:

  • Gain Knowledge of Computer Forensics in Today’s World
  • Gain a basic understanding and in-depth knowledge of Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Understanding Data Acquisition and Duplication
  • Gain knowledge on Defeating Anti-Forensics Techniques
  • Able to perform Windows, Linux and Mac Forensics
  • Gain experience and extensive knowledge of Network Forensics and Investigating Web Attacks
  • Gain knowledge of administering Dark Web, Database, Cloud, Malware, Mobile and IOT Forensics
  • Investigate Email Crimes

 

Pre-requisites

 

Knowledge, Skills & Experience

It is recommended that the participant have at least 1 year of relevant working experience in IT industry with knowledge in the area of Ethical Hacking / network security.

Recommended courses prior to taking CHFI

  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+
  • ISACA Cybersecurity Fundamentals
  • Identity and Access Management Essentials (SF)
  • EC-Council Certified Network Defender (CND) (SF)
  • EC-Council Certified Ethical Hacker (CEH) (SF)

Recommended for Career Path Advancement

  • EC Council Computer Hacking Forensic Investigator (CHFI) (For Incident Response and Forensics)
  • EC Council Certified Incident Handler (ECIH) (For Incident Response and Forensics)
  • EC Council Certified SOC Analyst (CSA) (For SOC Operations)
  • Cisco CCNA Cyber Security Operations (For SOC Operations)
  • ISC2 Certified Information Systems Security Professional (CISSP) (For Security Engineer)
  • Certificate of Cloud Auditing Knowledge (CCAK) (For Cloud Security)
  • ISC2 Certified Cloud Security Professional (CCSP) (For Cloud Security)

Hardware & Software
This course will be conducted as a Virtual Live Class (VLC) via Zoom platform. Participants must own a zoom account and have a laptop or a desktop with “Zoom Client for Meetings” installed. This can be downloaded from https://zoom.us/download.

System Requirement

Must Have:

Please ensure that your computer or laptop meets the following requirements.

  • Operating system: Windows 10 or MacOS (64 bit or above)
  • Processor/CPU: 1.8 GHz, 2-core Intel Core i3 or higher
  • Minimum 20 GB hard disk space.
  • Minimum 8 Gb RAM
  • Webcam (The camera must be turned on for the duration of the class)
  • Microphone
  • Internet Connection: Wired or Wireless broadband
  • Latest version of Zoom software to be installed on computer or laptop prior to the class.

Good to Have:

  • Wired internet connection
    Wired internet will provide you with stable and reliable connection.
  • Dual monitors
    Using a dual monitor setup will undoubtedly improve your training experience, enabling you to simultaneously participate in hands-on exercises and maintain engagement with your instructor.>

Not Recommended:

Using tablets is not recommended due to their smaller screen size, which could cause eye strain and discomfort over the course of the program's duration.

 

Course Outline

 

Module 01: Computer Forensics in Today’s World

Module 02: Computer Forensics Investigation Process

Module 03: Understanding Hard Disks and File Systems

Module 04: Data Acquisition and Duplication

Module 05: Defeating Anti-forensics Techniques

Module 06: Windows Forensics

Module 07: Linux and Mac Forensics

Module 08: Network Forensics

Module 09: Investigating Web Attacks

Module 10: Dark Web Forensics

Module 11: Database Forensics

Module 12: Cloud Forensics

Module 13: Investigating Email Crimes

Module 14: Malware Forensics

Module 15: Mobile Forensics

Module 16: IoT Forensics

 

Certificate Obtained and Conferred by

 

  • Certificate of Completion from NTUC LearningHub

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.

  • Statement of Attainment (SOA) from SkillsFuture Singapore

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):

ICT-OUS-3002-1.1 Cyber Forensics

  • External Certification

After completing this course and upon passing the official “EC-Council Computer Hacking Forensic Investigator (CHFI)” certification exam, candidates will receive the official certification from EC Council. The certification is governed and maintained by EC Council. For more information: https://cert.eccouncil.org/computer-hacking-forensic-investigator.html

Categories
More Information
  • NTUC LearningHub
  • No comments yet.
  • Add a review
    error: Content is protected !!