Sunteți pe pagina 1din 24

CFSI

Computer Forensics and Security Institute

Course Brochure 2011

CFSI@hackerforensics.com

1-868-684-0029

CFSI is a registered company and an ATC (Authorised Training Centre) for the Ec-Council

Computer Forensics and Security Institute

Contents
CompTIA A+ and Computer Repairs .......................................................................................... 3 CompTIA Network+ ................................................................................................................... 4 CompTIA Security+ ................................................................................................................... 6 CompTIA Linux+ ....................................................................................................................... 7 CompTIA Server+ ...................................................................................................................... 8 Cisco Certified Network Associate (CCNA) ............................................................................... 9 Certified Wireless Network Associate (CWNA)........................................................................ 11 Microsoft Certified Technology Specialist (MCTS): Windows 7 Configuration ........................ 12 Certified Information Systems Auditor (CISA) ......................................................................... 13 Certified Information Systems Manager (CISM) ....................................................................... 14 Certified internet Webmaster (CIW) Professional ..................................................................... 16 CIW Web Security Associate .................................................................................................... 17 Certified Ethical Hacker (CEH) Version 7.............................................................................. 18 Computer Hacking Forensic Investigator (CHFI) Version 4 ................................................... 20 Ec-Council Certified Systems Analyst (ECSA) Version 4 ...................................................... 22 Upcoming Courses .................................................................................................................... 24

Computer Forensics and Security Institute

CompTIA A+ and Computer Repairs

The CompTIA A+ certification is the industry standard for computer support technicians. The international, vendor-neutral certification proves competence in areas such as installation, preventative maintenance, networking, security and troubleshooting. CompTIA A+ certified technicians also have excellent customer service and communication skills to work with clients. CompTIA A+ is part of the certification track for corporations such as Microsoft, Hewlett- Packard, Cisco and Novell.

Course Outline: Introduction to Computers Understanding Electronic Communication An Overview of the Personal Computer The Central Processing Unit Power Supplies Motherboard and ROM BIOS Memory Expansion Buses, Cables, and Connectors Basic Disk Drives Advanced Disk Drive Technology The Display System Printers Portable Computers Connectivity and Networking Telecommunications: Modems and the Internet Operating System Fundamentals Introducing and Installing Microsoft Windows Running Microsoft Windows Maintaining the Modern Computer Upgrading a Computer Troubleshooting Techniques and Client Relations The Basics of Electrical Energy

Pre-requisites: Working knowledge of Windows and the Internet. Contact Hours: 80 Who Should Attend: Computer Enthusiasts working towards being Certified Computer Technicians.

Computer Forensics and Security Institute

CompTIA Network+

The CompTIA Network+ certification is the sign of a competent networking professional. It is an international, vendor-neutral certification that proves a technicians competency in managing, maintaining, troubleshooting, installing and configuring basic network infrastructure. Microsoft includes CompTIA Network+ in their Microsoft Certified Systems Administrator (MCSA) program, and other corporations such as Novell, Cisco and HP also recognize CompTIA Network+ as part of their certification tracks. Course Outline: Introduction to Networks Common Networking Protocols and Ports TCP/IP Addressing Routing Concepts Routing Protocols Cables and Connectors Physical Network Topologies Wiring Distribution Components LAN Technologies WAN Technologies Wireless Technology Network Devices , Configuration and Management Network Monitoring and Optimization Network Troubleshooting Methodologies Common Network Troubleshooting Issues Network Scanners Firewalls IPSec VPN Tunnelling and Encryption Remote Access User Authentication Device Management Security Common Threats and Mitigation Hardware Tools

Pre-requisites: Working knowledge of Windows and the Internet. Contact Hours: 42

Computer Forensics and Security Institute Who Should Attend: Computer Enthusiasts, Computer Technicians and persons interested in moving on towards being Network Administrators.

Computer Forensics and Security Institute

CompTIA Security+

The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. Security+ is an international, vendor- neutral certification that proves competency in system security, network infrastructure, access control and organizational security. Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty, according to a 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain or increase their investment in security. Major organizations that employ CompTIA Security+ certified staff include Hewlett-Packard, IBM, Motorola, Symantec, Telstra, Hitachi, Ricoh, Lockheed Martin, Unisys, Hilton Hotels Corp., General Mills, the U.S. Navy, Army, Air Force and Marines.

Course Outline: Introduction to and the need for Security Evaluating Common Security Threats Operating System Hardening Application Security Implementing Security Applications Network Infrastructure Attacks Network Design Elements and Components Network Security Tools Wireless Network Security Access Control Assessments and Audits (Part 1) General Cryptography Concepts Cryptography Algorithms and Protocols Public Key Infrastructure (PKI) Organizational Security

Pre-requisites: Basic Networking and an Understanding of the OSI Model. Contact Hours: 36 Who Should Attend: Computer and Network Technicians and persons interested in moving on towards being Network and/or Security Administrators.

Computer Forensics and Security Institute

CompTIA Linux+

CompTIA Linux+ Powered by LPI is a high-stakes, vendor-neutral certification that validates the fundamental knowledge and skills required of junior Linux administrators. Linux+ covers the Linux system architecture, Linux installation and package management, GNU and UNIX commands, devices, Linux file systems and the File system Hierarchy Standard. On completion of the course, the student will be able work at the Linux command line, perform maintenance tasks, assist users, and install and configure Linux workstations.

Course Outline: Introduction to Using Linux Planning your installation Pre-installation Hardware Considerations Installation of Linux Installing and Updating Software in Linux User Administration in Linux Administration of File systems and Security Administration of Networks in Linux Linux Essentials Configuring Printing and File Sharing Configuration Files and Related Topics Maintenance of a Linux System Troubleshooting Problems in a Linux System Troubleshooting in Linux Hardware issues in Linux Multimedia in Linux Introduction to sed and awk Security issues Printing and Mail

Pre-requisites: Network+ is an asset but not mandatory as long as the student has a working knowledge of networks. Contact Hours: 36 Who Should Attend: Computer and Network Technicians and persons interested in moving on towards being Junior Linux Administrators, Network and/or Security Administrators.

Computer Forensics and Security Institute

CompTIA Server+

CompTIA Server+ certifies the technical knowledge and skills required to build, maintain, troubleshoot and support server hardware and software technologies. This course also covers virtualization, disaster recovery and security procedures.

Course Outline: Introduction to Servers Server Roles System Board Types Server Chassis Types Memory Features Processor Features Expansion Cards NOS Installation, Configuration, Deployment and Security NOS Management Features Server Virtualization Networking Essentials Server RAID Internal and External Storage Technologies Documentation and Best Practices Environmental Controls and Location Server Access Methods Physical Security Measures Backup and Restore Replication, Retention, and Disposition Disaster Recovery Steps Troubleshooting and Methodology Hardware, Software and Network Troubleshooting and Tools Troubleshooting Storage Issues

Pre-requisites: A+ and Network+ are assets but not mandatory as long as the student has a working knowledge of computer and network technologies. Contact Hours: 36 Who Should Attend: Technical Support Professionals and Computer and Network Technicians as well as persons interested in moving on towards being Network Administrators.

Computer Forensics and Security Institute

Cisco Certified Network Associate (CCNA)

The Cisco Certified Network Associate (CCNA) certification validates your skills and knowledge required to deploy, maintain, secure and operate a medium-sized network using Cisco technologies. CCNA certified professionals can install, configure and operate LAN, WAN and dial access services for small networks. Students will gain the knowledge and skills required to install, operate, and troubleshoot a small to medium size enterprise branch network, including connecting to a WAN; implementing network security; network types; network media; routing and switching fundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and configuring IOS devices; extending switched networks with VLANs; determining IP routes; managing IP traffic with access lists; establishing point-to-point connections; and establishing Frame Relay connections. Course Outline: The OSI Model and its Layers in everything networking. TCP/IP: TCP and UDP Communication, Addressing and Ports Understanding LAN Switches Working with the Cisco Switch IOS Initial Setup of a Cisco Switch Configuring Switch Security Optimizing and Troubleshooting Switches Understanding Wireless Networking Wireless Security and Implementation Advanced TCP/IP: IP Subnetting Initial Router Configuration SDM and DHCP Server Configuration Implementing Static and Dynamic Routing Internet Access with NAT and PAT WAN Connectivity Telnet, SSH, and CDP Management and Security: File Management Understanding Trunks and VTP Configuring VLANs Switch STP: Understanding the Spanning-Tree Protocol General Switching: Troubleshooting and Security Best Practices Understanding VLSM Distance Vector vs. Link State OSPFC Concepts
9

Computer Forensics and Security Institute OSPFC Configuration and Troubleshooting EIGRP Concepts and Configuration Access-Lists: The Rules of the ACL Access-Lists: Configuring ACLs Command Line NAT Configuration Concepts of VPN Technology Configuring Frame Relay

Pre-requisites: Network+ and a thorough understanding of the OSI model. Security+ is an asset but not mandatory. Contact Hours: 42-50 Who Should Attend: Computer and Network Technicians and Administrators as well as persons interested in moving on towards becoming Network Administrators and Professionals.

10

Computer Forensics and Security Institute

Certified Wireless Network Associate (CWNA)

The CWNA certification can get you started in your wireless career by ensuring you have the skills to successfully administer enterprise-class wireless LAN. Students will gain a working knowledge of Radio Frequency (RF) Technologies, Antenna Concepts, Wireless LAN Hardware and Software, Network Design, Installation, and Management, Wireless Standards and Organizations, 802.11 Network Architecture, Wireless LAN Security, Performing Site Surveys and Troubleshooting. Course Outline: Revisiting the Wireless LAN Radio Frequency (RF) Fundamentals Spread Spectrum Technology Wireless LAN Infrastructure Devices Wireless LAN Antennas Wireless LAN Accessories Wireless LAN Organizations and Standards 802.11 Network Architecture MAC and Physical Layers Troubleshooting Wireless LAN Installations Wireless LAN Security Site Survey Fundamentals Site Survey Equipment and Procedures Radio Frequency (RF) Fundamentals Spread Spectrum Technology Wireless LAN Infrastructure Devices Wireless LAN Organization and Standards Wireless LAN Security Wireless Network Management Systems WLAN Deployment and Vertical Markets PoE, HT, and 802.11n

Pre-requisites: Network+ or 8 months networking experience. Contact Hours: 36 Who Should Attend: Computer and Network Technicians and Administrators as well as persons interested in moving on towards becoming Wireless Network Administrators and Professionals.
11

Computer Forensics and Security Institute

Microsoft Certified Technology Specialist (MCTS): Windows 7 Configuration

In this course, students will install, deploy, and upgrade to Windows 7, ensure hardware and software compatibility and configure pre-installation and post-installation system settings. Students will gain hands-on experience in Windows security features, network connectivity applications included with Windows 7, and mobile computing. This includes being able to maintain systems, monitor and resolve performance and reliability issues using the GUI as well as the Windows PowerShell. Course Outline: Installation, Upgrading and Migration Creating, Capturing and Deploying an Image Configuring a VHD Configuring Devices Managing Disks Managing Applications Application Restrictions Internet Explorer IPv4 Networking IPv6 Networking Wireless Networking Windows Firewall Remote Administration Accessing Resources Authentication and User Account Control Remote Access Mobile Computing Monitoring Systems Configuring Performance Windows Updates Backup and Recovery

Pre-requisites: Network+. Contact Hours: 30 Who Should Attend: Computer and Network Technicians as well as persons interested in moving on towards becoming Network Administrators and Networking Professionals.
12

Computer Forensics and Security Institute

Certified Information Systems Auditor (CISA)

The skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for individuals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. Course Outline: The IS Audit Process. Information Security Policies. Computer Assisted Audit Technique (CAAT) and Control Self-Assessment (CSA) Framework. Information Technology Governance. Risk Management Processes and Risk Analysis Methods. Project Management Practices, Tools and Control Frameworks. Organizational Change Management, IS Quality and Performance management. Systems and Infrastructure Life Cycle Management. Infrastructure Development Acquisition and IS Maintenance Methods. Application Controls and Auditing. Application developing, acquiring and maintaining business application systems. IT Service Delivery and Support. IS operation and Hardware, Hardware Management and IS architecture Incident and Problem Management Practices Information Security Management Network Infrastructure Security Attack Methods and Techniques Protection of Information Assets. Disaster Recovery and Business Continuity.

Pre-requisites: Training in Network+, Security+ and MCTS or equivalent. Contact Hours: 30 Who Should Attend: Networking Professionals who wish to expand into the lucrative and in-demand field of Network Security and Auditing.

13

Computer Forensics and Security Institute

Certified Information Systems Manager (CISM)

The management-focused CISM is a unique certification for individuals who design, build and manage enterprise information security programs. The CISM certification promotes international practices and individuals earning the CISM become part of an elite peer network, attaining a one-of-a-kind credential. Although certification may not be mandatory for you at this time, a growing number of organizations are recommending that employees become certified. To help ensure success in the global marketplace, it is vital to select a certification program based on universally accepted technical practices. Course Outline: Submitting Required Paperwork Asset Identification Risk Assessment Vulnerability Assessments Asset Management, Classification and Ownership Structured Information Risk Assessment Process Change Management Information Security Strategy Development of Information Security Architectures Security Awareness, Training, and Education Communication and Maintenance of Standards, Procedures, and Other Documentation Security Metrics Security Program Management Overview Security Baselines Security Program Infrastructure Security Impact on Users Accountability Response Management Overview Importance of Response Management Performing a Business Impact Analysis Developing Response and Recovery Plans The Incident Response Process Implementing Response and Recovery Plans Response Documentation Post-Event Reviews

Pre-requisites: Training in Network+, Security+ and MCTS or equivalent.


14

Computer Forensics and Security Institute Contact Hours: 36 Who Should Attend: Networking and Security Professionals who wish to advance their career into IT Managerial Positions.

15

Computer Forensics and Security Institute

Certified internet Webmaster (CIW) Professional

Course Outline: LEVEL 1 (3 parts): The CIW Internet Business Foundations course prepares you to work effectively in today's business environment. In this course, you will learn about the tasks involved in various Web Technology job roles, and you will learn the skills and technologies to perform them. The CIW Site Development Foundations course teaches you essential Web page development skills and ways to work as a productive part of a Web site development team.

The Network Technology Foundations course prepares you for job readiness in many business and technology-related careers. Understanding the fundamentals of networking, Internet protocols and network security is important for all professionals who use the Internet. LEVEL 2 (2 parts): The CIW Web Design Specialist course is for the individual who wants to develop the skills necessary to specialize in Web site design. Creating pages using popular production tools, including Microsoft Frontpage, Expression Web, and Adobe Dreamweaver, Fireworks and Flash. Design and development technologies, including Cascading Style Sheets (CSS) CSS, XHTML, and XML Essentials Web Site Management and Planning Web Site Copyright and Legal Issues

Pre-requisites: Must have a working knowledge and understanding of the Internet. Contact Hours: 42 Who Should Attend: Persons interested in Webpage and Website design.
16

Computer Forensics and Security Institute

CIW Web Security Associate

The CIW Network Security and Firewalls course teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter. Individuals with these security skills can pursue or advance careers in many aspects of online and network security. Course Outline: Network Security Background Elements of Security Applied Encryption Network Attack Categories Brute-Force and Dictionary Attacks System Bugs and Back Doors Malware (Malicious Software) Social Engineering Attacks Denial-of-Service (DOS) Attacks Distributed Denial-of-Service (DDOS) Attacks Spoofing Attacks Scanning Attacks Man-in-the-Middle Attacks Bots and Botnets Importance of Response Management Recent Network Vulnerability Considerations General Security Principles Protocol Layers and Security Securing Resources Firewalls and Virtual Private Networks Levels of Firewall Protection Detecting and Distracting Hackers Incident Response

Pre-requisites: Security+ Contact Hours: 24 Who Should Attend: Persons interested in Internet and Intranet Security.

17

Computer Forensics and Security Institute

Certified Ethical Hacker (CEH) Version 7

To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in. This class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. Course Outline: Module 01: Introduction to Ethical Hacking Module 02: Foot printing Module 03: Scanning Module 04: Enumeration Module 05: System Hacking Module 06: Trojans Module 07: Viruses/Worms Module 08: Sniffers Module 09: Social Engineering Module 10: Denial-of-Service Module 11: Session Hijacking Module 12: Hacking Webservers Module 13: Hacking Web Application Module 14: SQL injection Module 15: Wireless Hacking Module 16: Evading Firewalls Module 17: Buffer Overflows Module 18: Cryptography Module 19: Penetration Testing Pre-requisites: Network+ and Security+ or Equivalent. Contact Hours: 48 Who Should Attend: Security Officers, Auditors, Network and Security Administrators and Professionals, Site Administrators, and anyone who is concerned about the integrity of the network infrastructure.

18

Computer Forensics and Security Institute

NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $800 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre.

19

Computer Forensics and Security Institute

Computer Hacking Forensic Investigator (CHFI) Version 4

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a clients systems, to tracing the originator of defamatory emails, to recovering signs of fraud. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Students will draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as Computer Data Recovery. Course Outline: Module 01 - Computer Forensics in Today's World Module 02 - Computer Forensics Investigation Process Module 03 - Searching and Seizing Computers Module 04 - Digital Evidence Module 05 - First Responder Procedures Module 06 - Incident Handling Module 07 - Computer Forensics Lab Module 08 - Understanding Hard Disks and File Systems Module 09 - Digital Media Devices Module 10 - CD/DVD Forensics Module 11 - Windows Linux Macintosh Boot Process Module 12 - Windows Forensics I Module 13 - Windows Forensics II Module 14 - Linux Forensics Module 15 - Mac Forensics Module 16 - Data Acquisition and Duplication Module 17 - Recovering Deleted Files and Partition Module 18 - Forensic Investigation Using AccessData FTK Module 19 - Forensics Investigations Using EnCase Module 20 - Steganography Module 21 - Image File Forensics Module 22 - Audio File Forensics Module 23 - Application Password Crackers Module 24 - Network Forensics and Investigating Logs Module 25 - Investigating Network Traffic Module 26 - Router Forensics
20

Computer Forensics and Security Institute Module 27 - Investigating Wireless Attacks Module 28 - Investigating Web Attacks Module 29 - Investigating DoS Attacks Module 30 - Investigating Internet Crimes Module 31 - Tracking Emails and Investigating Email Crimes Module 32 - PDA Forensics Module 33 - BlackBerry Forensics Module 34 - iPod and iPhone Forensics Module 35 - Cell Phone Forensics Module 36 - Investigating Corporate Espionage Module 37 - Investigate Trademark and Copyright Infringement Module 38 - Investigating Sexual Harassment Incidents Module 39 - Investigating Child Pornography Cases Module 40 - Investigative Reports Module 41 - Becoming an Expert Witness The Updated CHFI v4 syllabus includes 24 new modules based on: Searching and Seizing of Computers, Digital Evidence, CD & DVD Forensics, Windows Forensics Mac Forensics, Image and File Forensics, Audio and File Forensics, Video File Forensics, Logs and Capturing Event Correlation, iPod and iPhone Forensics, USB Forensics, Printer Forensics, Investigating Computer Data Breaches, Investigating Identify Theft Cases, Investigating Defamation over Websites and Blog , Investigating Search Keywords, How to Become a Digital Detective, Computer Forensic Lawyers, Computer Forensics and Legal Compliance, Security Policies Rick Assessment, Evaluation and Certification of Information System, Computer Forensics Consulting Companies and Digital Forensic Templates Pre-requisites: Network+ and Security+ or Equivalent. CEH is an asset but not required. Contact Hours: 48 Who Should Attend: Security Officers, Auditors, Network and Security Administrators and Professionals, Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies and IT managers.

NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $800 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre.
21

Computer Forensics and Security Institute

Ec-Council Certified Systems Analyst (ECSA) Version 4

ECSA works hand in hand with CEH by going into the analytical phase of ethical hacking. ECSA is a logical progression from CEH by giving you the skills to analyze the outcome from these tools and technologies. ECSA will assist you in conducting intensive assessments required to create a robust risk management system through groundbreaking penetration testing methods and techniques. Students will learn how to clarify, isolate and overcome security problems in order to effectively avoid and eliminate them. The class will enable you to provide the best complete coverage of network security- testing topic and analysis. Designing and performing comprehensive tests on your networks will be second nature to you once you leave this advance class. Course Outline: Module 1: The Need for Security Analysis Module 2: Advanced Googling Module 3: TCP/IP Packet Analysis Module 4: Advanced Sniffing Techniques Module 5: Vulnerability Analysis with Nessus Module 6: Advanced Wireless Testing Module 7: Designing a DMZ Module 8: Snort Analysis Module 9: Log Analysis Module 10: Advanced Exploits and Tools Module 11: Penetration Testing Methodologies Module 12: Customers and Legal Agreements Module 13: Rules of Engagement Module 14: Penetration Testing Planning and Scheduling Module 15: Pre Penetration Testing Checklist Module 16: Information Gathering Module 17: Vulnerability Analysis Module 18: External Penetration Testing Module 19: Internal Network Penetration Testing Module 20: Routers and Switches Module 21: Firewall Penetration Testing Module 22: IDS Penetration Testing Module 23: Wireless Network Penetration Testing Module 24: Denial of Service Penetration Testing Module 25: Password Cracking
22

Computer Forensics and Security Institute Module 26: Social Engineering Module 27: Stolen Laptop, PDAs and Cell phones Penetration Testing Module 28: Application Penetration Testing Module 29: Physical Security Penetration Module 30: Database Penetration testing Module 31: VoIP Penetration Testing Module 32: VPN Penetration Testing Module 33: War Dialling Module 34: Virus and Trojan Detection Module 35: Log Management Penetration Testing Module 36: File Integrity Checking Module 37: Blue Tooth and Hand held Device Penetration Testing Module 38: Telecommunication and Broadband Communication Penetration Testing Module 39: Email Security Penetration Testing Module 40: Security Patches Penetration Module 41: Data Leakage Penetration Testing Module 42: Penetration Testing Deliverables and Conclusion Module 43: Penetration Testing Report and Documentation Module 44: Penetration Testing Report Analysis Module 45: Post Testing Actions Module 46: Ethics of a Licensed Penetration Tester Module 47: Standards and Compliance Pre-requisites: Network+ and Security+ or Equivalent. CEH is an asset but not required. Contact Hours: 42 Who Should Attend: Network and Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals.

NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $800 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre.

23

Computer Forensics and Security Institute

Upcoming Courses
Hacking and Penetration Testing With Backtrack 4 Wireshark Packet Analysis (Introduction to Intermediate) Digital Forensics using EnCase Digital Forensics using Helix, DD and FTK

24

S-ar putea să vă placă și