Gain knowledge in the specific security discipline of computer forensics from a vendor-neutral perspective. This course will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.
This course contains the following modules and videos. Click the down arror to view video details.
Module 1: Computer Forensics Introduction
Intro To Course-Part1
Intro To Course-Part2
Intro To Course-Part3
Intro To Course-Part4
Intro To Course-Part5
Intro To Forensics-Part1
Intro To Forensics-Part2
Intro To Forensics-Part3
Intro To Forensics-Part4
Intro To Forensics-Part5
Intro To Forensics-Part6
Intro To Forensics-Part7
Intro To Forensics-Part8
Module 2: Forensics Investigation Process
Forensics Investigation Process-Part1
Forensics Investigation Process-Part2
Forensics Investigation Process-Part3
Forensics Investigation Process-Part4
Forensics Investigation Process-Part5
Forensics Investigation Process-Part6
Forensics Investigation Process-Part7
Forensics Investigation Process-Part8
Forensics Investigation Process-Part9
Forensics Investigation Process-Part10
Module 3: Searching and Seizing
Searching And Seizing-Part1
Searching And Seizing-Part2
Searching And Seizing-Part3
Searching And Seizing-Part4
Searching And Seizing-Part5
Module 4: Digital Evidence
Digital Evidence-Part1
Digital Evidence-Part2
Digital Evidence-Part3
Digital Evidence-Part4
Digital Evidence-Part5
Digital Evidence-Part6
Digital Evidence-Part7
Module 5: First Responder Procedures
First Responder Procedures-Part1
First Responder Procedures-Part2
First Responder Procedures-Part3
First Responder Procedures-Part4
First Responder Procedures-Part5
First Responder Procedures-Part6
First Responder Procedures-Part7
First Responder Procedures-Part8
Module 6: Forensics Lab
Forensic Lab-Part1
Forensic Lab-Part2
Forensic Lab-Part3
Forensic Lab-Part4
Forensic Lab-Part5
Module 7: Hard Disks and File Systems
Hard Disks And File Systems-Part1
Hard Disks And File Systems-Part2
Hard Disks And File Systems-Part3
Hard Disks And File Systems-Part4
Hard Disks And File Systems-Part5
Hard Disks And File Systems-Part6
Hard Disks And File Systems-Part7
Hard Disks And File Systems-Part8
Hard Disks And File Systems-Part9
Hard Disks And File Systems-Part10
Module 8: Windows Forensics
Windows Forensics-Part1
Windows Forensics-Part2
Windows Forensics-Part3
Windows Forensics-Part4
Windows Forensics-Part5
Windows Forensics-Part6
Windows Forensics-Part7
Windows Forensics-Part8
Windows Forensics-Part9
Windows Forensics-Part10
Module 9: Data Acquisition and Duplication
Data Acquisition And Duplication-Part1
Data Acquisition And Duplication-Part2
Data Acquisition And Duplication-Part3
Data Acquisition And Duplication-Part4
Data Acquisition And Duplication-Part5
Data Acquisition And Duplication-Part6
Data Acquisition And Duplication-Part7
Module 10: Recovering Deleted Files and Partitions
Recovering Deleted Files And Partitions-Part1
Recovering Deleted Files And Partitions-Part2
Module 11: Using Access Data FTK
Using Access Data FTK And Special Steps-Part1
Using Access Data FTK And Special Steps-Part2
Using Access Data FTK And Special Steps-Part3
Using Access Data FTK And Special Steps-Part4
Using Access Data FTK And Special Steps-Part5
Using Access Data FTK And Special Steps-Part6
Using Access Data FTK And Special Steps-Part7
Using Access Data FTK And Special Steps-Part8
Module 12: Using EnCase
EnCase-Part1
EnCase-Part2
EnCase-Part3
Module 13: Steganography
Stenography-Part1
Stenography-Part2
Stenography-Part3
Stenography-Part4
Module 14: Password Crackers
Passwords-Part1
Passwords-Part2
Passwords-Part3
Passwords-Part4
Module 15: Log Correlation
Log Correlation-Part1
Log Correlation-Part2
Log Correlation-Part3
Log Correlation-Part4
Log Correlation-Part5
Log Correlation-Part6
Module 16: Network Forensics
Network Forensics-Part1
Network Forensics-Part2
Network Forensics-Part3
Network Forensics-Part4
Module 17: Wireless Attacks
Wireless Attacks-Part1
Wireless Attacks-Part2
Wireless Attacks-Part3
Module 18: Web Attacks
Web Attacks-Part1
Web Attacks-Part2
Web Attacks-Part3
Web Attacks-Part4
Web Attacks-Part5
Web Attacks-Part6
Web Attacks-Part7
Web Attacks-Part8
Module 19: Email Crimes
Email Crimes-Part1
Email Crimes-Part2
Email Crimes-Part3
Email Crimes-Part4
Module 20: Mobile Investigation
Mobile Investigation-Part1
Mobile Investigation-Part2
Mobile Investigation-Part3
Mobile Investigation-Part4
Mobile Investigation-Part5
Module 21: Investigative Reports
Investigation Reports-Part1
Investigation Reports-Part2
Investigation Reports-Part3
Investigation Reports-Part4
Module 22: Expert Witness
Expert Witness-Part1
Expert Witness-Part2
Expert Witness-Part3
Forensic Investigator in Computer Hacking
$99.00
Instructor Led Courses
All ITU Courses replicate a live class experience with an instructor on screen delivering the course's theories and concepts. These lectures are pre-recorded and available to the user 24/7. They can be repeated, rewound, fast-forwarded.
Visual Demonstrations, Educational Games & Flashcards
ITU recognizes that all students do not learn alike and different delivery mediums are needed in order to achieve success for a large student base. With that in mind, we deliver our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimization & Progress Tracking
Our courses are optimized for all mobile devices allowing students to learn on the go whenever they have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.
Practice Quizzes and Exams
ITU Online's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure you are confident on the topic you are learning.
World Class Learning Management System
ITU provides the next generation learning management system (LMS). An experience that combines the feature set of traditional Learning Management Systems with advanced functionality designed to make learning management easy and online learning engaging from the user’s perspective.
Need help? Call our support team at (855) 488-5327
Subscribe now to get special offers and discounts. By subscribing you will also be entered into our monthly drawing to win 1 full year of free ITU training.