Computer Forensics - Investigating Network Intrusions and Cyber Crime
CHAPTER 1: Network Forensics and Investigating Logs..
CHAPTER 2: Investigating Network Traffic
CHAPTER 3: Investigating Web Attacks
CHAPTER 4: Router Forensics.
CHAPTER 5: Investigating DoS Attacks.
CHAPTER 6: Investigating Internet Crime
CHAPTER 7: Tracking E-Mails and Investigating E-Mail Crime
CHAPTER 8: Investigating Corporate Espionage.
CHAPTER 9: Investigating Trademark and Copyright Infringement
CHAPTER 10: Investigating Sexual Harassment Incidents.
CHAPTER 11: Investigating Child Pornography.
- Source: EC-Council
- Certification: C|HFI – Computer Hacking Forensic Investigator
- Function: to identify an intruder’s footprints
CHAPTER 1: Network Forensics and Investigating Logs..
CHAPTER 2: Investigating Network Traffic
CHAPTER 3: Investigating Web Attacks
CHAPTER 4: Router Forensics.
CHAPTER 5: Investigating DoS Attacks.
CHAPTER 6: Investigating Internet Crime
CHAPTER 7: Tracking E-Mails and Investigating E-Mail Crime
CHAPTER 8: Investigating Corporate Espionage.
CHAPTER 9: Investigating Trademark and Copyright Infringement
CHAPTER 10: Investigating Sexual Harassment Incidents.
CHAPTER 11: Investigating Child Pornography.