Computer Hacking Forensics Investigator 2

Official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide

Watchers:
This resource is being watched by 382 members.
  1. Mr. Penguin
    This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide

    It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. Key features include:

    The Only Official Study Guide for CHFI: Provides 100% coverage of all exam objectives.

    Full Web-based Exam: Modeled after the real exam, it also includes explanations of correct and incorrect answers.

    Exam Objectives: Each is clearly explained at the beginning of the chapter.

    Notes and Alerts: Highlight crucial points of the exam modules.

    Exam Objectives Fast Track: Bulleted highlights emphasize the important points from the exam's perspective at the end of the chapter.

    Key Terms: All concepts are defined and explained as they appear.

    Exam Objectives Frequently Asked Questions: Test what you have learned by reading FAQs based on the material covered in the chapter. Log on to the Syngress Web site to access review questions based on the exam.

    About the Author: Dave Kleiman (CAS, CCE, CIFI, CISM, CISSP, ISSAP, ISSMP, MCSE) has worked in the Information Technology Security sector since 1990. Currently, he is the owner of SecurityBreachResponse.com, and is the Chief Information Security Officer for Securit-e-Doc, Inc. Before starting this position, he was Vice President of Technical Operations at Intelliswitch, Inc., where he supervised an international telecommunications and Internet service provider network.

    Dave is a recognized security expert. A former Florida Certified Law Enforcement Officer, he specializes in computer forensic investigations, incident response, intrusion analysis, security audits, and secure network infrastructures. He has written several secure installation and configuration guides about Microsoft technologies that are used by network professionals.

    He has developed a Windows Operating System lockdown tool, S-Lok (www.s-doc.com/products/slok.asp ), which surpasses NSA, NIST, and Microsoft Common Criteria Guidelines. Dave was a contributing author to Microsoft Log Parser Toolkit (Syngress Publishing, ISBN: 1-932266-52-6). He is frequently a speaker at many national security conferences and is a regular contributor to many security-related newsletters, Web sites, and Internet forums. Dave is a member of several organizations, including the International Association of Counter Terrorism and Security Professionals (IACSP), International Society of Forensic Computer Examiners (ISFCE), Information Systems Audit and Control Association (ISACA), High Technology Crime Investigation Association (HTCIA), Network and Systems Professionals Association (NaSPA), Association of Certified Fraud Examiners (ACFE), Anti Terrorism Accreditation Board (ATAB), and ASIS International.

    He is also a Secure Member and Sector Chief for Information Technology at The FBI's InfraGard and a Member and Director of Education at the International Information Systems Forensics Association (IISFA).

    Paperback: 843 pages
    Publisher: Syngress; Stg edition (October 8, 2007)
    Language: English
    ISBN-10: 1597491977
    ISBN-13: 978-1597491976

Recent Updates

  1. OMG
  2. Fixed link

Recent Reviews

  1. Julio Marquez
    Julio Marquez
    4/5,
    Version: 2
    Great supporting resource
  2. Anonymous
    Anonymous
    3/5,
    Version: 2
    excellent