Home / Computer Hacking Forensic Investigation

Computer Hacking Forensic Investigation

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Electronic evidence is critical in the following situations:
* Computer break-ins ,Breach of contract ,Industrial espionage ,E-mail Fraud
* Web page defacements,Theft of company documents
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.

The CHFI Course will benefit:
* IT managers
* Police and other law enforcement personnel, Defense and Military personnel , Government agencies
* Systems administrators , e-Business Security professionals
* Banking, Insurance and other professionals, Legal professionals

Duration 40Hrs

Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use


  • Computer Forensics and Investigations as a Profession
  • Understanding Computer Investigations
  • Working with Windows and DOS Systems
  • Macintosh and Linux Boot Processes and Disk Structures
  • The Investigator’s Office and Laboratory
  • Current Computer Forensics Tools
  • Digital Evidence Controls
  • Processing Crime and Incident Scenes
  • Data Acquisition
  • Computer Forensic Analysis
  • E-mail Investigations
  • Recovering Image Files
  • Writing Investigation Reports
  • Becoming an Expert Witness
  • Computer Security Incident Response Team
  • Logfile Analysis
  • Recovering Deleted Files
  • Application Password Crackers
  • Investigating E-Mail Crimes
  • Investigating Web Attacks
  • Investigating Network Traffic
  • Investigating Router Attacks
  • The Computer Forensics Process
  • Data Duplication
  • Windows Forensics
  • Linux Forensics
  • Investigating PDA
  • Enforcement Law and Prosecution
  • Investigating Trademark and Copyright Infringement

1,552 total views, 1 views today

Web Design MymensinghPremium WordPress ThemesWeb Development

Close of registration of MSU ICT courses

Registration of for MSU ICT programs end on 15 July 2015.


BMIS,DMIS DNEP and DTEL results are out .All students are advised to come and collect their results at the campus.



ICT Programs Junes Intake

ICT applications for June 2017 Intake for Bsc  in Management Information System (Honors) Degree (BMIS) and Diplomas in Management Information System (DMIS), Telecommunications (DTEL) and Networking and PC Engineering (DNEP) are in progress .These are offered  in collaboration with Midlands State University (MSU) .