CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide

┬╖ McGraw Hill Professional
4.6
7 рд╕рдореАрдХреНрд╖рд╛рдПрдВ
рдИ-рдмреБрдХ
656
рдкреЗрдЬ

рдЗрд╕ рдИ-рдмреБрдХ рдХреЗ рдмрд╛рд░реЗ рдореЗрдВ рдЬрд╛рдирдХрд╛рд░реА

An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council

Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative guide addresses the tools and techniques required to successfully conduct a computer forensic investigation. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference.

CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide covers all exam topics, including:

  • Computer forensics investigation process
  • Setting up a computer forensics lab
  • First responder procedures
  • Search and seizure laws
  • Collecting and transporting digital evidence
  • Understanding hard disks and file systems
  • Recovering deleted files and partitions
  • Windows forensics
  • Forensics investigations using the AccessData Forensic Toolkit (FTK) and Guidance Software's EnCase Forensic
  • Network, wireless, and mobile forensics
  • Investigating web attacks
  • Preparing investigative reports
  • Becoming an expert witness

Electronic content includes:

  • 300 practice exam questions
  • Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain

рд░реЗрдЯрд┐рдВрдЧ рдФрд░ рд╕рдореАрдХреНрд╖рд╛рдПрдВ

4.6
7 рд╕рдореАрдХреНрд╖рд╛рдПрдВ

рд▓реЗрдЦрдХ рдХреЗ рдмрд╛рд░реЗ рдореЗрдВ

Charles L. Brooks (Watertown, MA) first encountered the Internet in the late 1970s and has never strayed far from it. Charles began his career as a software developer in network management and network performance analysis: later projects included distributed computing and web research. He developed his current passion for security while building a managed VPN service in early 2000s. Since then, Charles has provided network security consulting services to SOHO businesses while working as a course developer and instructional designer for several security courses, including securing storage-area networks, network security analysis, and network forensics. Most recently, Charles has developed and taught graduate courses on network security, software security testing and virtualization, and cloud security at Brandeis University.

рдЗрд╕ рдИ-рдмреБрдХ рдХреЛ рд░реЗрдЯрд┐рдВрдЧ рджреЗрдВ

рд╣рдореЗрдВ рдЕрдкрдиреА рд░рд╛рдп рдмрддрд╛рдПрдВ.

рдкрдарди рдЬрд╛рдирдХрд╛рд░реА

рд╕реНрдорд╛рд░реНрдЯрдлрд╝реЛрди рдФрд░ рдЯреИрдмрд▓реЗрдЯ
Android рдФрд░ iPad/iPhone рдХреЗ рд▓рд┐рдП Google Play рдХрд┐рддрд╛рдмреЗрдВ рдРрдкреНрд▓рд┐рдХреЗрд╢рди рдЗрдВрд╕реНрдЯреЙрд▓ рдХрд░реЗрдВ. рдпрд╣ рдЖрдкрдХреЗ рдЦрд╛рддреЗ рдХреЗ рд╕рд╛рде рдЕрдкрдиреЗ рдЖрдк рд╕рд┐рдВрдХ рд╣реЛ рдЬрд╛рддрд╛ рд╣реИ рдФрд░ рдЖрдкрдХреЛ рдХрд╣реАрдВ рднреА рдСрдирд▓рд╛рдЗрди рдпрд╛ рдСрдлрд╝рд▓рд╛рдЗрди рдкрдврд╝рдиреЗ рдХреА рд╕реБрд╡рд┐рдзрд╛ рджреЗрддрд╛ рд╣реИ.
рд▓реИрдкрдЯреЙрдк рдФрд░ рдХрдВрдкреНрдпреВрдЯрд░
рдЖрдк рдЕрдкрдиреЗ рдХрдВрдкреНрдпреВрдЯрд░ рдХреЗ рд╡реЗрдм рдмреНрд░рд╛рдЙрдЬрд╝рд░ рдХрд╛ рдЙрдкрдпреЛрдЧ рдХрд░рдХреЗ Google Play рдкрд░ рдЦрд░реАрджреА рдЧрдИ рдСрдбрд┐рдпреЛ рдХрд┐рддрд╛рдмреЗрдВ рд╕реБрди рд╕рдХрддреЗ рд╣реИрдВ.
eReaders рдФрд░ рдЕрдиреНрдп рдбрд┐рд╡рд╛рдЗрд╕
Kobo рдИ-рд░реАрдбрд░ рдЬреИрд╕реА рдИ-рдЗрдВрдХ рдбрд┐рд╡рд╛рдЗрд╕реЛрдВ рдкрд░ рдХреБрдЫ рдкрдврд╝рдиреЗ рдХреЗ рд▓рд┐рдП, рдЖрдкрдХреЛ рдлрд╝рд╛рдЗрд▓ рдбрд╛рдЙрдирд▓реЛрдб рдХрд░рдХреЗ рдЙрд╕реЗ рдЕрдкрдиреЗ рдбрд┐рд╡рд╛рдЗрд╕ рдкрд░ рдЯреНрд░рд╛рдВрд╕рдлрд╝рд░ рдХрд░рдирд╛ рд╣реЛрдЧрд╛. рдИ-рд░реАрдбрд░ рдкрд░ рдХрд╛рдо рдХрд░рдиреЗ рд╡рд╛рд▓реА рдлрд╝рд╛рдЗрд▓реЛрдВ рдХреЛ рдИ-рд░реАрдбрд░ рдкрд░ рдЯреНрд░рд╛рдВрд╕рдлрд╝рд░ рдХрд░рдиреЗ рдХреЗ рд▓рд┐рдП, рд╕рд╣рд╛рдпрддрд╛ рдХреЗрдВрджреНрд░ рдХреЗ рдирд┐рд░реНрджреЗрд╢реЛрдВ рдХрд╛ рдкрд╛рд▓рди рдХрд░реЗрдВ.