Computer Forensics Series, preparing learners for C|HFI certification, is meant for those studying to become police investigators and other enforcement personnel, defense and military personnel, e-business security professionals, database administrators, legitimate professionals, banking, insurance professionals, government agencies, and IT managers. The content of this program is meant to show the learner to the method of detecting attacks and collecting evidence during a forensically sound manner with the intent to report crime and prevent future attacks.
Advanced techniques in computer investigation and analysis with significance in generating potential legal clue are included. In full, this series prepares the learner to identify evidence in computer-related crime and abuse cases also as track the intrusive hacker’s path through client system.
Books in Series
- Computer Forensics: Investigation Procedures and Response
- Computer Forensics: Investigating Hard Disks, File and Operating Systems
- Computer Forensics: Investigating Data and Image Files
- Computer Forensics: Investigating Network Intrusions and Cybercrime
- Computer Forensics: Investigating Wireless Networks and Devices

Computer Forensics – Investigating Network Intrusions and Cyber Crime: Table of Content
- Network Forensics and Investigating Logs
- Investigating Network Traffic
- Investigating Web Attacks
- Router Forensics
- Investigating DoS Attacks
- Investigating Internet Crime
- Tracking E-Mails and Investigating E-Mail Crime
- Investigating Corporate Espionage
- Investigating Trademark and Copyright Infringement
- Investigating Sexual Harassment Incidents
- Investigating Child Pornography