EC-Council Computer Hacking Forensic Investigator v9 - CHFI

EC-Council Computer Hacking Forensic Investigator v9 - CHFI Course Description

Duration: 5.00 days (40 hours)

EC-Council ATC

Over the last many years, EC-Council’s CHFI certification has gained massive traction and recognition amongst Fortune 500 enterprises globally. It has immensely benefited professionals from law enforcement, criminal investigation, defense, and security field. CHFI v9, the latest version of the program has been designed for professionals handling digital evidence while investigating cybercrimes. It is developed by an experienced panel of subject matter experts and industry specialists, and also has set global standards for computer forensics best practices. In addition, it also aims at elevating the knowledge, understanding, and skill levels of in cyber security and forensics practitioners.

CHFI v9 covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this EC-Council Computer Hacking Forensic Investigator v9 - CHFI Course

  • » Anyone interested in cyber forensics/investigations
  • » Attorneys, legal consultants, and lawyers
  • » Law enforcement officers
  • » Police officers
  • » Federal/ government agents
  • » Defense and military
  • » Detectives/ investigators
  • » Incident response team members
  • » Information security managers
  • » Network defenders
  • » IT professionals, IT directors/ managers
  • » System/network engineers
  • » Security analyst/ architect/ auditors/ consultants

Back to Top

Course Prerequisites for EC-Council Computer Hacking Forensic Investigator v9 - CHFI

  • » IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response
  • » Prior completion of CEH training would be an advantage

Back to Top

EC-Council Computer Hacking Forensic Investigator v9 - CHFI Course Objectives

  • » Perform incident response and forensics
  • » Perform electronic evidence collections
  • » Perform digital forensic acquisitions
  • » Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.
  • » Examine and analyze text, graphics, multimedia, and digital images
  • » Conduct thorough examinations of computer hard disk drives, and other electronic data storage media
  • » Recover information and electronic data from computer hard drives and other data storage devices
  • » Follow strict data and evidence handling procedures
  • » Maintain audit trail (i.e., chain of custody) and evidence integrity
  • » Work on technical examination, analysis and reporting of computer-based evidence
  • » Prepare and maintain case files
  • » Utilize forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files
  • » Gather volatile and non-volatile information from Windows, MAC and Linux
  • » Recover deleted files and partitions in Windows, Mac OS X, and Linux
  • » Perform keyword searches including using target words or phrases
  • » Investigate events for evidence of insider threats or attacks
  • » Support the generation of incident reports and other collateral
  • » Investigate and analyze all response activities related to cyber incidents
  • » Plan, coordinate and direct recovery activities and incident analysis tasks
  • » Examine all available information and supporting evidence or artefacts related to an incident or event

Back to Top

EC-Council Computer Hacking Forensic Investigator v9 - CHFI Course Outline

      1. Computer Forensics in Today’s World
        1. Understanding Computer Forensics
        2. Why and When Do You Use Computer Forensics?
        3. Cyber Crime (Types of Computer Crimes)
        4. Case Study
        5. Challenges Cyber Crimes Present For Investigators
        6. Cyber Crime Investigation
          1. Civil versus Criminal Investigation
          2. Case Study: Criminal Case
          3. Case Study: Civil Case
          4. Administrative Investigation
          5. Case Study: Administrative Case
        7. Rules of Forensics Investigation
          1. Enterprise Theory of Investigation (ETI)
        8. Understanding Digital Evidence
        9. Types of Digital Evidence
        10. Characteristics of Digital Evidence
        11. Role of Digital Evidence
          1. Digital Forensics Challenges
        12. Sources of Potential Evidence
        13. Rules of Evidence
          1. Best Evidence Rule
          2. “Hearsay” concept
          3. Federal Rules of Evidence
        14. Forensics Readiness
          1. Forensics Readiness Planning
        15. Computer Forensics as part of an Incident Response Plan
        16. Need for Forensic Investigator
        17. Roles and Responsibilities of Forensics Investigator
        18. What makes a Good Computer Forensics Investigator?
        19. Investigative Challenges
          1. Computer Forensics: Legal Issues
          2. Computer Forensics: Privacy Issues
        20. Legal and Privacy Issues
        21. Code of Ethics
        22. Accessing Computer Forensics Resources
      2. Computer Forensics Investigation Process
        1. Importance of Computer Forensics Process
        2. Phases Involved in the Computer Forensics Investigation Process
        3. Pre-investigation Phase
          1. Setting Up a Computer Forensics Lab
          2. Build the Investigation Team
          3. Review Policies and Laws
          4. Establish Quality Assurance Processes
          5. Data Destruction Industry Standards
          6. Risk Assessment
        4. Investigation Phase
          1. Investigation Process
          2. Computer Forensics Investigation Methodology: First Response
            1. First Response Basics
            2. Incident Response: Different Situations
            3. First Responder Common Mistakes
            4. Documenting the Electronic Crime Scene
          3. Computer Forensics Investigation Methodology: Search and Seizure
            1. Consent
            2. Conducting Preliminary Interviews
            3. Planning the Search and Seizure
            4. Warrant for Search and Seizure
            5. Searches Without a Warrant
            6. Health and Safety Issues
            7. Securing and Evaluating Electronic Crime Scene: A Checklist
          4. Computer Forensics Investigation Methodology: Collect the Evidence
            1. Collect Physical Evidence
            2. Collecting and Preserving Electronic Evidence
            3. Dealing with Powered On Computers
            4. Dealing with Powered Off Computers
            5. Dealing with Networked Computer
            6. Dealing with Open Files and Startup Files
            7. Operating System Shutdown Procedure
            8. Computers and Servers
            9. Preserving Electronic Evidence
            10. Seizing Portable Computers
            11. Dealing with Switched On Portable Computers
          5. Computer Forensics Investigation Methodology: Secure the Evidence
            1. Evidence Management
            2. Chain of Custody
            3. Storing Electronic Evidence
          6. Computer Forensics Investigation Methodology: Data Acquisition
            1. Guidelines for Acquiring Evidence
            2. Duplicate the Data (Imaging)
            3. Verify Image Integrity
            4. Recover Lost or Deleted Data
          7. Computer Forensics Investigation Methodology: Data Analysis
        5. Post-investigation Phase
          1. Computer Forensics Investigation Methodology: Evidence Assessment
            1. Evidence Assessment
            2. Case Assessment
            3. Processing Location Assessment
            4. Collecting Evidence from Social Networks
            5. Best Practices on how to Behave as an Investigator on Social Media
            6. Best Practices to Assess the Evidence
          2. Computer Forensics Investigation Methodology: Documentation and Reporting
            1. Documentation in Each Phase
            2. Gather and Organize Information
            3. Writing the Investigation Report
          3. Computer Forensics Investigation Methodology: Testify as an Expert Witness
            1. Expert Witness
            2. Testifying in the Court Room
            3. Closing the Case
            4. Maintaining Professional Conduct
      3. Understanding Hard Disks and File Systems
        1. Hard Disk Drive Overview
          1. Disk Drive Overview
          2. Hard Disk Drive (HDD)
          3. Solid-State Drive (SSD)
          4. Physical Structure of a Hard Disk
          5. Logical Structure of Hard Disk
          6. Types of Hard Disk Interfaces
          7. Hard Disk Interfaces
            1. ATA
            2. SCSI
            3. IDE/EIDE
            4. USB
            5. Fibre Channel
          8. Tracks
            1. Track Numbering
          9. Sector
            1. Sector Addressing
            2. Advanced Format: Sectors
          10. Cluster
            1. Cluster Size
            2. Slack Space
            3. Lost Clusters
          11. Bad Sectors
          12. Understanding Bit, Byte, and Nibble
          13. Hard Disk Data Addressing
          14. Data Densities on a Hard Disk
          15. Disk Capacity Calculation
          16. Measuring the Performance of the Hard Disk
        2. Disk Partitions and Boot Process
          1. Disk Partitions
          2. BIOS Parameter Block (BPB)Partitioning utilities
          3. Master Boot Record
            1. Structure of a Master Boot Record
          4. Globally Unique Identifier (GUID)
            1. GUID Partition Table (GPT)
          5. What is the Booting Process?
          6. Essential Windows System Files
          7. Windows Boot Process
          8. Identifying GUID Partition Table (GPT)
          9. Analyzing the GPT Header and Entries
          10. GPT Artifacts
          11. Macintosh Boot Process
          12. Linux Boot Process
        3. Understanding File Systems
          1. Understanding File Systems
          2. Types of File Systems
          3. Windows File Systems
            1. File Allocation Table (FAT)
            2. New Technology File System (NTFS)
          4. Linux File Systems
          5. Mac OS X File Systems
          6. Oracle Solaris 11 File System: ZFS
          7. CD-ROM / DVD File System
          8. Compact Disc File System (CDFS)
          9. Virtual File System (VFS) and Universal Disk Format File System (UDF)
        4. RAID Storage System
          1. Levels of RAID Storage System
          2. Host Protected Areas (HPA) and Device Configuration Overlays (DCO)
        5. File System Analysis
          1. File Carving
          2. Image File Analysis: JPEG
          3. Image File Analysis: BMP
          4. Hex View of Popular Image File Formats
          5. PDF File Analysis
          6. Word File Analysis
          7. PPT File Analysis
          8. Excel File Analysis
          9. Hex View of Other Popular File Formats
            1. Video
            2. Audio
          10. File System Analysis Using Autopsy
          11. File System Analysis Using The Sleuth Kit (TSK)
          12. The Sleuth Kit (TSK): fsstat
          13. The Sleuth Kit (TSK): istat
          14. The Sleuth Kit (TSK): fls and img_stat
      4. Data Acquisition and Duplication
        1. Data Acquisition and Duplication Concepts
          1. Understanding Data Acquisition
            1. Types of Data Acquisition Systems
          2. Live Data Acquisition
          3. Order of Volatility
          4. Common Mistakes in Volatile Data Collection
          5. Volatile Data Collection Methodology
        2. Static Acquisition
          1. Static Data Acquisition
          2. Rules of Thumb
          3. Why to Create a Duplicate Image?
          4. Bit Stream Image Vs. Backups
          5. Issues with Data Duplication
          6. Data Acquisition and Duplication Steps
          7. Prepare a Chain of Custody Document
          8. Enable Write Protection on the Evidence Media
          9. Sanitize the Target Media: NIST SP 800-88 Guidelines
          10. Determine the Data Acquisition Format
          11. Data Acquisition Methods
          12. Determine the Best Acquisition Method
          13. Select the Data Acquisition Tool
            1. Mandatory Requirements
            2. Optional Requirements
          14. Data Acquisition and Duplication Tools: Hardware
          15. Data Acquisition and Duplication Tools: Software
          16. Linux Standard Tools
          17. Acquiring Data on Linux: dd Command
          18. Acquiring Data on Linux: dcfldd Command
          19. Acquiring Data on Windows: AccessData FTK Imager
          20. Acquiring RAID Disks
          21. Remote Data Acquisition
          22. Data Acquisition Mistakes
          23. Plan for Contingency
        3. Validate Data Acquisitions
          1. Linux Validation Methods
          2. Windows Validation Methods
        4. Acquisition Best Practices
      5. Defeating Anti-forensics Techniques
        1. What is Anti-Forensics?
          1. Goals of Anti-Forensics
        2. Anti-Forensics techniques
          1. Data/File Deletion
          2. Password Protection
          3. Steganography
          4. Data Hiding in File System Structures
          5. Trail Obfuscation
          6. Artifact Wiping
          7. Overwriting Data/Metadata
          8. Encryption
          9. Encrypted Network Protocols
          10. Program Packers
          11. Rootkits
          12. Minimize Footprint
          13. Exploiting Forensic Tools Bugs
          14. Detecting Forensic Tool Activities
          15. Anti-Forensics Countermeasures
          16. Anti-Forensics Challenges
          17. Anti-forensics Tools
      6. Operating System Forensics (Windows, Mac, Linux)
        1. Introduction to OS Forensics
        2. Windows Forensics
        3. Collecting Volatile Information
          1. Volatile Information
        4. Collecting Non-Volatile Information
          1. Non-Volatile Information
        5. Analyze the Windows thumbcaches
        6. Windows Memory Analysis
          1. Virtual Hard Disk (VHD)
          2. Memory Dump
          3. EProcess Structure
          4. Process Creation Mechanism
          5. Parsing Memory Contents
          6. Parsing Process Memory
          7. Extracting the Process Image
          8. Collecting Process Memory
        7. Windows Registry Analysis
          1. Inside the Registry
          2. Registry Structure within a Hive File
          3. The Registry as a Log File
          4. Registry Analysis
          5. System Information
          6. TimeZone Information
          7. Shares
          8. Wireless SSIDs
          9. Startup Locations
          10. Importance of volume shadow copy services
          11. System Boot
          12. User Login
          13. User Activity
          14. Enumerating Autostart Registry Locations
          15. USB Removable Storage Devices
          16. Mounted Devices
          17. Tracking User Activity
          18. The UserAssist Keys
          19. MRU Lists
          20. Connecting to Other Systems
          21. Analyzing Restore Point Registry Settings
          22. Determining the Startup Locations
        8. Cache, Cookie, and History Analysis
          1. Cache, Cookie, and History Analysis: Mozilla Firefox
          2. Cache, Cookie, and History Analysis: Google Chrome
          3. Cache, Cookie, and History Analysis: Microsoft Edge
        9. Windows File Analysis
          1. System Restore Points (Rp.log Files)
          2. System Restore Points (Change.log.x Files)
          3. Prefetch Files
          4. Shortcut Files
          5. Image Files
        10. Metadata Investigation
          1. Understanding Metadata
          2. Types of Metadata
          3. Metadata in Different File Systems
          4. Metadata in PDF Files
          5. Metadata in Word Documents
          6. Tool: Metashield Analyzer
        11. Text Based Logs
          1. Understanding Events
          2. Types of Logon Events
          3. Event Log File Format
          4. Organization of Event Records
          5. ELF_LOGFILE_HEADER structure
          6. EventLogRecord Structure
          7. Windows 10 Event Logs
        12. Other Audit Events
          1. Evaluating Account Management Events
          2. Examining System Log Entries
          3. Examining Application Log Entries
        13. Forensic Analysis of Event Logs
          1. Searching with Event Viewer
          2. Using Event Log explorer to Examine Windows Log Files
          3. Windows Event Log Files Internals
        14. Windows Forensics Tools
        15. Linux Forensics
          1. Shell Commands
          2. Linux Log files
          3. Collecting Volatile Data
          4. Collecting Non-Volatile Data
        16. MAC Forensics
          1. Introduction to MAC Forensics
          2. MAC Forensics Data
          3. MAC Log Files
          4. MAC Directories
          5. MAC Forensics Tools
      7. Network Forensics
        1. Introduction to Network Forensics
          1. Network Forensics
          2. Postmortem and Real-Time Analysis
          3. Network Vulnerabilities
          4. Network Attacks
          5. Where to Look for Evidence
        2. Fundamental Logging Concepts
          1. Log Files as Evidence
          2. Laws and Regulations
          3. Legality of using Logs
          4. Records of Regularly Conducted Activity as Evidence
        3. Event Correlation Concepts
          1. Event Correlation
          2. Types of Event Correlation
          3. Prerequisites of Event Correlation
          4. Event Correlation Approaches
        4. Network Forensic Readiness
          1. Ensuring Log File Accuracy
          2. Implement Log Management
          3. Ensure System’s Integrity
          4. Control Access to Logs
        5. Network Forensics Steps
          1. Ensure Log File Authenticity
          2. Work with Copies
          3. Maintain Chain of Custody
          4. Condensing Log File
          5. Analyze Logs
        6. Network Traffic Investigation
          1. Why Investigate Network Traffic?
          2. Evidence Gathering via Sniffing
          3. Network Packet Analyzer: Capsa Portable Network Analyzer
          4. Gathering Evidence from an IDS
      8. Investigating Web Attacks
        1. Introduction to Web Application Forensics
          1. Introduction to Web Application Forensics
          2. Web Application Architecture
          3. Challenges in Web Application Forensics
        2. Web Attack Investigation
          1. Indications of a Web Attack
          2. Web Application Threats - 1
          3. Web Application Threats - 2
          4. Investigating a Web Attack
          5. Investigating Web Attacks in Windows-Based Servers
        3. Investigating Web Server Logs
          1. Internet Information Services (IIS) Logs
          2. Investigating Apache Logs
          3. Investigating Apache Logs
          4. Investigating Cross-Site Scripting (XSS)
          5. Investigating XSS: Using Regex to Search XSS Strings
          6. Investigating SQL Injection Attacks
          7. Pen-Testing CSRF Validation Fields
          8. Investigating Code Injection Attack
          9. Investigating Cookie Poisoning Attack
        4. Web Attack Detection Tools
          1. Web Log Viewers
        5. Tools for Locating IP Address
          1. IP Address Locating Tools
        6. WHOIS Lookup Tools
        7. WHOIS Lookup Tools
      9. Database Forensics
        1. Database Forensics and Its Importance
        2. MSSQL Forensics
          1. Data Storage in SQL Server
          2. Database Evidence Repositories
          3. Collecting Volatile Database Data
        3. MySQL Forensics
          1. Internal Architecture of MySQL
          2. MySQL Forensics
      10. Cloud Forensics
        1. Introduction to Cloud Computing
          1. Types of Cloud Computing Services
          2. Separation of Responsibilities in Cloud
          3. Cloud Deployment Models
          4. Cloud Computing Threats
          5. Cloud Computing Attacks
        2. Cloud Forensics
          1. Usage of Cloud Foreniscs
          2. Cloud Crimes
          3. Case Study: Cloud as a Subject
          4. Case Study: Cloud as the Object
          5. Case Study: Cloud as a Tool
          6. Cloud Forensics: Stakeholders and their Roles
          7. Cloud Forensics Challenges
          8. Investigating Cloud Storage Services
          9. Investigating Dropbox Cloud Storage Service
          10. Investigating Google Drive Cloud Storage Service
          11. Cloud Forensics Tools: UFED Cloud Analyzer
      11. Malware Forensics
        1. Introduction to Malware
          1. Different Ways a Malware can Get into a System
          2. Common Techniques Attackers Use to Distribute Malware on the Web
          3. Components of Malware
        2. Introduction to Malware Forensics
          1. Why Analyze Malware
          2. Identifying and Extracting Malware
          3. Prominence of Setting up a Controlled Malware Analysis Lab
          4. Preparing Testbed for Malware Analysis
          5. Supporting Tools for Malware Analysis
          6. General Rules for Malware Analysis
          7. Documentation Before Analysis
          8. Types of Malware Analysis
      12. Investigating Email Crimes
        1. Email System
          1. Email Clients
          2. Email Server
          3. SMTP Server
          4. POP3 Server
          5. IMAP Server
          6. Importance of Electronic Records Management
        2. Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
          1. Crime Via Chat Room
        3. Email Message
          1. Sample of Email Header
          2. List of Common Headers
          3. List of Common X-Headers
        4. Steps to Investigate Email Crimes and Violation
          1. Obtain a Search Warrant and Seize the Computer and Email Account
          2. Examine E-mail Messages
          3. Acquire Email Archives
          4. Recover Deleted Emails
          5. Examining Email Logs
          6. Recover My Email
          7. MailXaminer
          8. Email Forensics Tools
          9. Laws and Acts against Email Crimes
      13. Mobile Phone Forensics
        1. Mobile Device Forensics
          1. Why Mobile Forensics?
          2. Top Threats Targeting Mobile Devices
          3. Mobile Hardware and Forensics
          4. Mobile OS and Forensics
          5. What Should You Do Before the Investigation?
          6. Mobile Forensics Process
      14. Forensics Report Writing and Presentation
        1. Writing Investigation Reports
          1. Forensic Investigation Report
          2. Important Aspects of a Good Report
          3. Forensic Investigation Report Template
          4. Report Classification
          5. Guidelines for Writing a Report
          6. Other Guidelines for Writing a Report
        2. Expert Witness Testimony
          1. What is an Expert Witness?
          2. Roles of an Expert Witness
          3. Technical Witness Vs. Expert Witness
          4. Daubert Standard
          5. Frye Standard
          6. What Makes a Good Expert Witness?
          7. Importance of Curriculum Vitae
          8. Professional Code of Conduct for an Expert Witness
          9. Preparing for a Testimony
          10. Deposition
          11. Dealing with Media

Back to Top

This training prepares students for the following exam(s):

  • » CHFI v9 - Exam-Voucher : CHFI v9 Exam Voucher
  • » CHFI v9 - Exam-PU : CHFI Exam Voucher with ProctorU

Back to Top

Do you have the right background for EC-Council Computer Hacking Forensic Investigator v9 - CHFI?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Emilio G.
- Vastly experienced working within multinational environments and capable of connecting to different audiences - In-depth expertise in the implementation, troubleshooting and documentation of networks and security systems, with strong "hands on" technical knowledge of CISSP, CEH and CHFI. - Master of Science in Electronics Engineering, and holder of several technical certifications. - Highly-skilled in diverse fields ranging from Security, Computer Forensics, Networking, Routing Protocols, Programming, Databases and Applications to name a few. Bio: With over 25 years of technical experience, Emilio brings a dynamic set of skills supported by a Masters Degree in Electronics Engineering and on-the-field experience working in multinational environments. He also holds more than 12 Cisco, CompTIA, and Microsoft certifications. Although he is well versed and thorough in multiple technological fields, his technical forte lies in the security domain, specifically CISSP, CEH and CHFI. Emilio's skills have evolved over time, studying closely and constantly staying well informed of the growing cyber threats. These are just some of the few reasons why Emilio brings to his classes more than just what's in the books.
Larry G.
- More than 14 years of experience as a Security Subject Matter Expert as well as black belt in a variety of martial arts.
- Numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command.
- Much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.

Bio:

Larry is a unique instructor and IT security expert. If you sit in one of his classes you might get the feeling of being in a martial arts class - That's exactly how Larry wants it! "The principles behind IT security are the same as those in a variety of martial arts," Larry says. In addition to teaching IT security for over 14 years, he has practiced martial arts since he was 13 years old and holds black belts in multiple disciplines including Tai Chi, Kung Fu, and Kick Boxing. "All of these techniques are like tools for different types of attacks," Larry explains.

Larry's excellence in certification training and passion for IT security has earned him numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command. He is also a much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.
Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.

Bio:

Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

Highly professional, engaging and informative!

- Chris A.
Course(s) Taken

» Technical Webinar: Raise your defenses against Malware & Ransomware attacks

  More testimonials »  

Back to Top