Cyber Security Forensic Investigator & Ethical Hacker Package


Learn to think like a hacker and apply that knowledge to building security provisions that deter cybercriminals with the Cyber Security Forensic Investigator & Ethical Hacker package.

Report Abuse


Learn to think like a hacker and apply that knowledge to building security provisions that deter cybercriminals with the Cyber Security Forensic Investigator & Ethical Hacker package. Combining the Computer Hacking Forensic Investigator and Certified Ethical Hacker certification courses, this package helps students learn the tricks used by cybercriminals to access corporate systems and how they can be stopped.

Students will also master the science of forensic investigations, helping to gather the necessary evidence to prosecute hackers in the event of an attempted or successful network breach.

The Cyber Security Forensic Investigator & Ethical Hacker package is best suited to:

  • Network engineers and IT security professionals who need to understand hacking techniques so that they can better protect resources.
  • Network engineers and IT security professionals responsible for investigating network perimeter breaches and data theft incidents.
  • IT professionals who need to earn the certifications to prove their experience in the field of network security.
  • Network security consultants who want to offer ethical hacking services to clients.
  • Network security professionals tasked with testing defences and identifying potential vulnerabilities.
  • Individuals who would like to learn the skills and techniques required to make a career change into IT security.

Key Learning Points

The Cyber Security Forensic Investigator & Ethical Hacker package is divided into two separate sections. The first – built around the Certified Ethical Hacker certification looks at the tools and techniques used by hackers so that students can replicate their attacks and tighten security accordingly.

Working towards their exams, students will cover:

  • Understanding the ethics involved in white hat hacking.
  • How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked early.
  • How to scan networks to identify potential vulnerabilities.
  • Using enumeration to catalogue system resources and potential routes to breach.
  • Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks.
  • The role of social engineering to steal confidential information directly from employees.
  • Using sniffers and session hijacking to mask illegal access to system resources.
  • Web-based attacks that can take online systems down.
  • How wireless network security can be breached.
  • How hackers avoid protective measures like IDS, firewalls and honeypots.
  • Applying network forensic techniques to identify and catch hackers.
  • Using cryptography and steganography to protect data.
  • How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate.

Once complete, package focus moves over to the Computer Hacking Forensic Investigator qualification which shows students how to properly investigate a cybersecurity breach:

  • How to carry out an investigation according to industry best practice principles and legal guidelines.
  • Searching and seizing resources as required for the investigation.
  • How to handle digital evidence to maintain legal standards.
  • What the first responder needs to do as soon as a breach is identified to prevent loss of evidence or failing to meet legal evidence requirements.
  • How to fit a forensic lab for investigations.
  • Understanding hard disks and file systems and how they affect forensic recovery.
  • The specifics of performing forensic investigations on computers running Microsoft Windows.
  • Acquiring and duplicating data to preserve evidence and facilitate further investigation.
  • Using Access Data’s Forensic Tookit (FTK), EnCase and special steps to review data whilst leaving all evidence intact.
  • Understanding steganography and how such techniques can be used to mask data theft.
  • Password recovery techniques and how to circumvent basic technologies employed to hide criminal activity.
  • Comparing log files to identify instances where they may have been tampered with.
  • Carrying out forensic analysis of network resources to identify intrusion attempts.
  • Checking wireless networks for evidence of unauthorised access or tampering.
  • Investigating attacks against web servers, web applications and other Internet-connected resources.

Advantages of this course

The Cyber Security Forensic Investigator & Ethical Hacker package helps students to see security issues from both sides – first as the hacker, then as a security professional trying to keep them out. This ability to understand security from both sides of the network perimeter enables learners to create more secure, more robust protective measures.

Other benefits students will realise from this course include:

  • Hands on skills and experience that will allow security professionals to properly manage breaches and cyberattacks.
  • The necessary forensic and legal awareness to ensure that evidence of cybercrimes is preserved for potential legal proceedings.
  • A raised level of awareness that can be used to train other employees to share security responsibilities and implement new policies.
  • An improved skill set that will help employees be more productive and efficient.
  • Increased employment opportunities within the network security and forensic auditing arena.

With ethical hackers and security specialists earning an average of $100,000 (£65,000) each year, the investment in the Cyber Security Forensic Investigator & Ethical Hacker package will quickly repay itself. The package is also a pre-requisite for professionals who want to sit their ISACA CISA certification exams.

Computer Hacking Forensic Investigator
  • Intro to Course
  • Intro to Forensics
  • Forensics Investigation Process
  • Searching and Seizing
  • Digital Evidence
  • First Responder Procedures
  • Forensic Lab
  • Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Using Access Data FTK and Special Steps
  • EnCase
  • Stenography
  • Passwords
  • Log Correlation
  • Network Forensics
  • Wireless Attacks
  • Web Attacks
  • Email Crimes
  • Mobile Investigation
  • Investigation Reports
  • Expert Witness
Certified Ethical Hacker
  • Intro
    • PretestIntro
    • Questions
    • PretestSummary
    • Intro to Ethical Hacking
  • Footprinting & Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans & Backdoors
  • Viruses & Worms
  • Denial of Service
  • Social Engineering
  • Snffers
  • Session Hijacking
  • Hacking Web Servers
  • Web Application Vulnerabilities
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls & Honeypots
  • Buffer Overflows
  • Cryptography & Steganography
  • Metasploit for Penertration Testing
    • Business Process
    • Lab Suggestions

Additional information

Exams Included


Course Type

Online Course

Expiry Date After Purchase

1 year

Device Processor

1 gigahertz (GHz)

RAM Required

1 GB

Operating System

iOS, Windows 10, Windows 7, Windows 8


Google Chrome, Internet Explorer 8 or above, Mozilla Firefox, Safari 6 or above


Android, iPad, iPhone, Mac, Windows


There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Vendor Information

  • Store Name: Otutu Online Store
  • Vendor: Otutu Online Store
  • No ratings found yet!

We want you to be satisfied, so all eligible courses purchased on Vogate can be refunded within 14 days. For whatever reason, if you are unhappy with a course, you can request a refund, provided the request meets the guidelines in our refund policy.

Certain restrictions may apply and some purchases may only be eligible for credit refunds. For more information regarding our refund policy, please see below.

How to submit a refund request

If you’re looking for instructions on how to submit a refund request, please visit our support and help section

Our 14-day policy

While our 14-day refund policy is to allow customers to learn risk free, we must also protect our vendors from fraud and provide them a reasonable payment schedule. Payments are sent to vendor after 30 days, so we will not process refund requests received after 14 days of purchase.

Additional reasons for denied refunds

We reserve the right, in our sole discretion, to limit or deny refund requests in cases where we believe there is refund abuse, including but not limited to the following:

  • A significant portion of the course has been consumed or downloaded by a customer before the refund was requested.
  • Multiple refunds have been requested by a customer for the same course or other courses
  • Excessive refunds have been requested by a customer.
  • Users who have their account reported, banned or course access disabled due to a violation of our Terms or Trust & Safety Guidelines. 
  • We do not grant refunds for any subscription services.

These refund restrictions will be enforced to the extent permitted by applicable law. 

Product Enquiry