CFS: Wireless Networks and Devices

Computer Forensic Specialist Wireless Networks and Devices


Course Description CHFI

Course Description
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent the future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating the potential legal evidence. This and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law.

Investigating wireless networks and devices discusses how to investigate wireless attacks, as well as PDA, i-Pod, i-Phone, and BlackBerry forensics.

 

 

Learn about Wireless Networks and Devices EC-Council's CFS Courseware

 

Who Should Attend
This course will significantly benefit the security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

  • Duration: 2 days (9:00AM – 5:00PM)
  • CPE/ECE Qualification: 2 ECE Credits awarded for attendance (1 for each 8 hour class day)
  • Program Cost: $750 USD
  • Supplement Cost (Courseware & Certificate exam Access): $75 USD
  • Bundle Price: $799 USD
  • Getting Started: Find Training Click HERE
  • Corporate Trainers interested in setting up internal company training programs, click here

 

About-us CHFI

 

What’s included?

  • Physical Courseware
  • 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate

Related Certificates:

  • Computer Forensic Specialist: Procedures & Response
  • Computer Forensic Specialist: Storage Device & Operating Systems
  • Computer Forensic Specialist: Network Intrusion & Cybercrime
  • Computer Forensic Specialist: Data and Image Files

 


Course Briefing

Managing IT PM

Investigating Wireless Attacks

With the increase in the use of wireless network and wireless devices, there is an increase in the number of security issues. Wireless attacks became easy for attackers who are familiar with passive attack techniques resulting in loss of time and money of the company/organization. This chapter familiarizes you with the types of wireless attacks and thus helps you in investigating those attacks. It covers the topics such as analyzing DHCP log files for issued MAC addresses, firewall logs for intrusions, and network logs for intrusion activities during investigating wireless networks. It also highlights the various scanning tools that are used.


 

 











Protocal Analysis

PDA Forensics

Personal Digital Assistants (PDA) is a lightweight and small mobile handheld device. Computer forensic investigators handling a PDA would need a basic understanding of the features of various types of PDA available in the market. They must take care in examining the PDA because any wrong step would lead to the loss of valuable and case-related information. This chapter describes the basic understanding of PDA, its security issues, and various PDA forensics steps taken while PDA forensic investigation. It also highlights the forensic tools and their features that are helpful during investigation.


 








Cell Phone Forensics

iPod and iPhone Forensics

Like any other digital storage device, the iPod/ iPhone may hold incriminating evidence. In its native format, the iPod/ iPhone may contain calendar entries related to a crime or other event of interest. Additionally, contact information stored on the device may be relevant to an investigation. The iPod/ iPhone is also capable of creating voice recordings. As such, recordings of meetings may be recovered. Coupled with photographs or other substantiation, the iPod/ iPhone could be a rich source of evidence to the investigator. With its large hard drive, the iPod/ iPhone is the ideal storage location for music that violates Copyright and with the newer devices pornographic pictures. This chapter discusses how iPod/ iPhone acts as excellent alternate data storage option, its features, how to conduct forensic analysis on the data hidden within the device, how iPod/ iPhone forensic investigation is carried out, and how to avoid the misuse of iPod/ iPhone.

 













Cell Phone Forensics

CFS305 Chapter 04 BlackBerry Forensics

Blackberry is a personal wireless handheld device that supports e-mail, mobile phone capabilities, text messaging, web browsing, and other wireless information services. This chapter familiarizes with topics such as Blackberry, Blackberry functions, and its security. It mainly focuses on ways of collecting evidence from Blackberry and how Blackberry investigation is carried. It also highlights the signing authority tool which protects the data and intellectual property of the applications.