CHFI: Computer Hacking Forensic Investigator Course Content
Total Page:16
File Type:pdf, Size:1020Kb
CHFI: Computer Hacking Forensic Investigator Course ID #: 1275-200-ZZ-W Hours: 40 Course Content Course Description: CHFI v9 covers a detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations CHFI provides training in the necessary skills to perform effective digital forensic investigation. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout computer forensic investigation leading to prosecution of perpetrators. CHFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence. Target Student: Anyone interested in cyber forensics/investigations Attorneys, Legal Consultants, and Lawyers Law Enforcement Officers Police Officers Federal/Government Agents Defense and Military Detectives/Investigators Incident Response Team Members Information Security Managers Network Defenders IT Professionals, IT Directors/Managers System/Network Engineers Security Analyst/Architect/Auditors/Consultants www.tcworkshop.com Pages 1 of 17 800.639.3535 CHFI: Computer Hacking Forensic Investigator Course ID #: 1275-200-ZZ-W Hours: 40 Prerequisites: IT/Forensics Professionals with basic knowledge on IT/Cyber Security, Computer Forensics, and Incident response. Prior completion of CEH training would be an advantage. Topics: Module 01: Computer Forensics in Today’s Computer Forensics as part of an Incident World Response Plan Understanding Computer Forensics Need for Forensic Investigator Why and When Do You Use Computer Roles and Responsibilities of Forensics Forensics? Investigator Cyber Crime (Types of Computer Crimes) What makes a Good Computer Forensics Case Study Investigator? Challenges Cyber Crimes Present For Investigative Challenges Investigators o Computer Forensics: Legal Issues Cyber Crime Investigation o Computer Forensics: Privacy Issues o Civil versus Criminal Investigation Legal and Privacy Issues o Case Study: Criminal Case Code of Ethics o Case Study: Civil Case Accessing Computer Forensics Resources o Administrative Investigation o Case Study: Administrative Case Module 02: Computer Forensics Investigation Rules of Forensics Investigation Process o Enterprise Theory of Investigation (ETI) Importance of Computer Forensics Process Understanding Digital Evidence Phases Involved in the Computer Forensics Types of Digital Evidence Investigation Process Characteristics of Digital Evidence Pre-investigation Phase Role of Digital Evidence o Setting Up a Computer Forensics Lab o Digital Forensics Challenges . Planning and Budgeting Sources of Potential Evidence . Physical Location and Structural Rules of Evidence Design Considerations o Best Evidence Rule . Work Area Considerations o “Hearsay” concept . Physical Security o Federal Rules of Evidence Recommendations . Scientific Working Group on . Fire-Suppression Systems Digital Evidence (SWGDE) . Evidence Locker Forensics Readiness Recommendations o Forensics Readiness Planning . Auditing the Security of a Forensics Lab www.tcworkshop.com Pages 2 of 17 800.639.3535 CHFI: Computer Hacking Forensic Investigator Course ID #: 1275-200-ZZ-W Hours: 40 . Human Resource Considerations . Incident Response: Different . Build a Forensics Workstation Situations . Basic Workstation Requirements in First Response by System a Forensics Lab Administrators . Build a Computer Forensics First Response by Non- Toolkit Forensic Staff . Forensics Hardware First Response by Laboratory . Forensics Software (Cont’d) Forensic Staff o Build the Investigation Team . First Responder Common Mistakes . Forensic Practitioner Certification . Documenting the Electronic Crime and Licensing Scene o Review Policies and Laws Photographing the Scene . Forensics Laws Sketching the Scene o Establish Quality Assurance Processes Note Taking Checklist . Quality Assurance Practices in o Computer Forensics Investigation Digital Forensics Methodology: Search and Seizure . General Quality Assurance in the . Consent Digital Forensic Process Sample of Consent Search . Quality Assurance Practices: Form Laboratory Software and Witness Signatures Hardware Witness Statement Checklist . Laboratory Accreditation . Conducting Preliminary Programs Interviews o Data Destruction Industry Standards . Planning the Search and Seizure o Risk Assessment Initial Search of the Scene . Risk Assessment Matrix . Warrant for Search and Seizure Investigation Phase Obtain Search Warrant o Investigation Process Example of Search Warrant . Questions to Ask When a Client . Searches Without a Warrant Calls the Forensic Investigator . Health and Safety Issues . Checklist to Prepare for a . Securing and Evaluating Electronic Computer Forensics Investigation Crime Scene: A Checklist . Notify Decision Makers and o Computer Forensics Investigation Acquire Authorization Methodology: Collect the Evidence o Computer Forensics Investigation . Collect Physical Evidence Methodology: First Response Evidence Collection Form . First Responder . Collecting and Preserving Roles of First Responder Electronic Evidence . First Response Basics www.tcworkshop.com Pages 3 of 17 800.639.3535 CHFI: Computer Hacking Forensic Investigator Course ID #: 1275-200-ZZ-W Hours: 40 . Dealing with Powered On . Verify Image Integrity Computers MD5 Hash Calculators: . Dealing with Powered Off HashCalc, MD5 Calculator Computers and HashMyFiles . Dealing with Networked . Recover Lost or Deleted Data Computer Data Recovery Software . Dealing with Open Files and o Computer Forensics Investigation Startup Files Methodology: Data Analysis . Operating System Shutdown . Data Analysis Procedure Post-investigation Phase . Computers and Servers o Computer Forensics Investigation . Preserving Electronic Evidence Methodology: Evidence Assessment . Seizing Portable Computers . Evidence Assessment . Dealing with Switched On . Case Assessment Portable Computers . Processing Location Assessment o Computer Forensics Investigation . Collecting Evidence from Social Methodology: Secure the Evidence Networks . Evidence Management . Best Practices on how to Behave as . Chain of Custody an Investigator on Social Media Simple Format of the Chain . Best Practices to Assess the of Custody Document Evidence Chain of Custody Forms o Computer Forensics Investigation Chain of Custody on Methodology: Documentation and Property Evidence Reporting Envelope/Bag and Sign-out . Documentation in Each Phase Sheet . Gather and Organize Information . Packaging and Transporting . Writing the Investigation Report Electronic Evidence o Computer Forensics Investigation Evidence Bag Contents List Methodology: Testify as an Expert Packaging Electronic Witness Evidence . Expert Witness Exhibit Numbering . Testifying in the Court Room Transporting Electronic . Closing the Case Evidence . Maintaining Professional Conduct . Storing Electronic Evidence o Computer Forensics Investigation Methodology: Data Acquisition . Guidelines for Acquiring Evidence . Duplicate the Data (Imaging) www.tcworkshop.com Pages 4 of 17 800.639.3535 CHFI: Computer Hacking Forensic Investigator Course ID #: 1275-200-ZZ-W Hours: 40 Module 03: Understanding Hard Disks and File o What is the Booting Process? Systems o Essential Windows System Files Hard Disk Drive Overview o Windows Boot Process o Disk Drive Overview o Identifying GUID Partition Table (GPT) o Hard Disk Drive (HDD) o Analyzing the GPT Header and Entries o Solid-State Drive (SSD) o GPT Artifacts o Physical Structure of a Hard Disk o Macintosh Boot Process o Logical Structure of Hard Disk o Linux Boot Process o Types of Hard Disk Interfaces Understanding File Systems o Hard Disk Interfaces o Understanding File Systems . ATA o Types of File Systems . SCSI o Windows File Systems . IDE/EIDE . File Allocation Table (FAT) . USB FAT File System Layout . Fibre Channel FAT Partition Boot Sector o Tracks FAT Folder Structure . Track Numbering Directory Entries and Cluster o Sector Chains . Sector Addressing Filenames on FAT Volumes . Advanced Format: Sectors FAT32 o Cluster . New Technology File System . Cluster Size (NTFS) . Slack Space NTFS Architecture . Lost Clusters NTFS System Files o Bad Sectors NTFS Partition Boot Sector o Understanding Bit, Byte, and Nibble Cluster Sizes of NTFS o Hard Disk Data Addressing Volume o Data Densities on a Hard Disk NTFS Master File Table o Disk Capacity Calculation (MFT) o Measuring the Performance of the Hard o Metadata Files Stored in Disk the MFT Disk Partitions and Boot Process NTFS Attributes o Disk Partitions NTFS Data Stream o BIOS Parameter Block (BPB)Partitioning NTFS Compressed Files utilities o Setting the Compression o Master Boot Record State of a Volume . Structure of a Master Boot Record Encrypting File Systems (EFS)