
The Official CHFI Study Guide (Exam 312-49)
for Computer Hacking Forensic Investigator
- 1st Edition - November 7, 2007
- Imprint: Syngress
- Author: Dave Kleiman
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 1 9 7 - 6
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 5 5 5 7 1 - 3
This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteThis is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute.
The EC-Council offers certification for ethical hacking and computer forensics. Their ethical hacker exam has become very popular as an industry gauge and we expect the forensics exam to follow suit.
Material is presented in a logical learning sequence: a section builds upon previous sections and a chapter on previous chapters. All concepts, simple and complex, are defined and explained when they appear for the first time. This book includes: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight crucial points, Exam’s Eye View emphasizes the important points from the exam’s perspective, Key Terms present definitions of key terms used in the chapter, Review Questions contains the questions modeled after real exam questions based on the material covered in the chapter. Answers to the questions are presented with explanations. Also included is a full practice exam modeled after the real exam.
The EC-Council offers certification for ethical hacking and computer forensics. Their ethical hacker exam has become very popular as an industry gauge and we expect the forensics exam to follow suit.
Material is presented in a logical learning sequence: a section builds upon previous sections and a chapter on previous chapters. All concepts, simple and complex, are defined and explained when they appear for the first time. This book includes: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight crucial points, Exam’s Eye View emphasizes the important points from the exam’s perspective, Key Terms present definitions of key terms used in the chapter, Review Questions contains the questions modeled after real exam questions based on the material covered in the chapter. Answers to the questions are presented with explanations. Also included is a full practice exam modeled after the real exam.
- The only study guide for CHFI, provides 100% coverage of all exam objectives.
- CHFI Training runs hundreds of dollars for self tests to thousands of dollars for classroom training.
Police and law enforcement personnel, military personnel, security professionals, systems administrators, legal professionals, banking, insurance, IT managers or people studying for the CHFI certification.
Computer Forensics in Today's World
Law And Computer Forensics
Computer Investigation Process
Computer Security Incident Response Team
Computer Forensic Laboratory Requirements
Understanding File systems and Hard disks
Windows Forensics
Linux and Macintosh Boot processes
Linux Forensics
Data Acquisition and Duplication
Recovering Deleted Files
Image Files Forensics
Steganography
Computer Forensic Tools
Application password crackers
Investigating Logs
Investigating network traffic
Router Forensics
Investigating Web Attacks
Tracking E-mails and Investigating E-mail crimes
Mobile and PDA Forensics
Investigating Trademark and Copyright
Infringement
Investigative Reports
Becoming an Expert Witness
Forensics in action
Law And Computer Forensics
Computer Investigation Process
Computer Security Incident Response Team
Computer Forensic Laboratory Requirements
Understanding File systems and Hard disks
Windows Forensics
Linux and Macintosh Boot processes
Linux Forensics
Data Acquisition and Duplication
Recovering Deleted Files
Image Files Forensics
Steganography
Computer Forensic Tools
Application password crackers
Investigating Logs
Investigating network traffic
Router Forensics
Investigating Web Attacks
Tracking E-mails and Investigating E-mail crimes
Mobile and PDA Forensics
Investigating Trademark and Copyright
Infringement
Investigative Reports
Becoming an Expert Witness
Forensics in action
- Edition: 1
- Published: November 7, 2007
- Imprint: Syngress
- No. of pages: 960
- Language: English
- Paperback ISBN: 9781597491976
- eBook ISBN: 9780080555713
DK
Dave Kleiman
Dave Kleiman (CAS, CCE, CIFI, CISM, CISSP, ISSAP, ISSMP, MCSE) has worked in the Information Technology Security sector since 1990. Currently, he is the owner of SecurityBreachResponse.com, and is the Chief Information Security Officer for Securit-e-Doc, Inc. Before starting this position, he was Vice President of Technical Operations at Intelliswitch, Inc., where he supervised an international telecommunications and Internet service provider network. Dave is a recognized security expert. A former Florida Certified Law Enforcement Officer, he specializes in computer forensic investigations, incident response, intrusion analysis, security audits, and secure network infrastructures. He has written several secure installation and configuration guides about Microsoft technologies that are used by network professionals. He has developed a Windows Operating System lockdown tool, S-Lok (www.s-doc.com/products/slok.asp ), which surpasses NSA, NIST, and Microsoft Common Criteria Guidelines. Dave was a contributing author to Microsoft Log Parser Toolkit (Syngress Publishing, ISBN: 1-932266-52-6). He is frequently a speaker at many national security conferences and is a regular contributor to many security-related newsletters, Web sites, and Internet forums. Dave is a member of several organizations, including the International Association of Counter Terrorism and Security Professionals (IACSP), International Society of Forensic Computer Examiners® (ISFCE), Information Systems Audit and Control Association® (ISACA), High Technology Crime Investigation Association (HTCIA), Network and Systems Professionals Association (NaSPA), Association of Certified Fraud Examiners (ACFE), Anti Terrorism Accreditation Board (ATAB), and ASIS International®. He is also a Secure Member and Sector Chief for Information Technology at The FBI’s InfraGard® and a Member and Director of Education at the International Information Systems Forensics Association (IISFA).
Affiliations and expertise
International Association of Counter Terrorism and Security Professionals, International Society of Forensic Computer Examiners, Secure Member and Sector Chief for Information Technology at The FBI’s InfraGard, FL, USA.Read The Official CHFI Study Guide (Exam 312-49) on ScienceDirect