Read more

2 Month/20 Hours                                                  Price:1450,000

                                                                                      140,000

Computer Hacking Forensic Investigator (CHFI) Training 

A CHFI is a skilled professional trained in the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. CHFI professionals are aware of legally sound detailed methodological approach to computer forensics and evidence analysis.

Computer Hacking Forensic Investigation (CHFI) is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program.


CHFI Course Key Learning 

Understanding Investigation processes in Computer forensics
Legal issues involved in investigations
Searching evidence and digital handprints
Methodologies of Acquisition and Seizing
Digital evidence, their types, examination processes
Electronic crime and its categories
Electronic crime scene evaluation, acquiring and conducting primary interviews
Electronic evidence preservation and reporting crime scenes
Setting up a forensic lab in computer
Knowledge of Windows, Linux, and mac boot-up
File systems and their differences, booting a failed hard drive
Volatile and non-volatile information gatherings
Recover deleted files and hard disk partitions
Steganography, Steganalysis and forensics of image files
Concepts of password cracking and investigating password attacks
Investigate log files and determine the root cause
Access Data FTK expertise
Attacks on wireless and related issues
E-mail crimes, its investigation and recovery of deleted mail
Writing investigative reports


Course Content: 

Module 1.  Computer Forensics in Today's World

  • Introduction to Computer Forensics
  • Objectives and benefits of computer forensics
    Understanding the need for digital forensics
    Types of computer crimes
    Legal issues and considerations
    Challenges in computer forensics

    Module 2: Computer Forensics Investigation Process

    Steps in computer forensics investigations
    Creating an investigation plan
    Roles of a computer forensic investigator
    Investigation methodology
     Module3: Understanding Hard Disks and File Systems

    Describe Different Types of Disk Drives and their Characteristics
    Explain the Logical Structure of a Disk
    Understand the Booting Process of Windows, Linux, and macOS Operating Systems
    Understand Various File Systems of Windows, Linux and macOS Operating Systems
    Understand File System Analysis
    Understand Storage Systems
    Understand Encoding Standards and Hex Editors
    Analyze Popular File Formats Using Hex Editor
    Module4: Data Acquisition and Duplication

    Understand Data Acquisition Fundamentals
    Understand eDiscovery
    Understand Data Acquisition Methodology
    Prepare an Image File for Examination

     Module5: Defeating Anti-forensics Techniques

    Understand Anti-forensics Techniques
    Discuss Data Deletion and Recycle Bin Forensics
    Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
    Explore Password Cracking/Bypassing Techniques
    Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
    Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
    Detect Program Packers and Footprint Minimizing Techniques
    Module6: Windows Forensics

    Understand Windows Forensics
    Collect Volatile Information 
    Collect Non-volatile Information
    Perform Windows Memory Analysis
    Perform Windows Registry Analysis
    Perform Electron Application Analysis
    Perform Web Browser Forensics
    Examine Windows Files and Metadata
    Understand ShellBags, LNK Files, and Jump Lists
    Understand Text-based Logs and Windows Event Logs

    Module7: Linux and Mac Forensics
    Collect Volatile Information in Linux
    Collect Non-volatile Information in Linux
    Understand Linux Memory Forensics
    Understand Mac Forensics
    Collect Volatile Information in Mac
    Collect Non-volatile Information in Mac
    Understand Mac Memory Forensics and Mac Forensics Tools
    Module8 Network Forensics
    Understand Network Forensics
    Summarize Event Correlation Concepts
    Identify Indicators of Compromise (IoCs) from Network Logs
    Investigate Network Traffic
    Perform Incident Detection and Examination Using SIEM Tools
    Understand Wireless Network Forensics
    Detect and Investigate Wireless Network Attacks
     Module 9 Malware Forensics
    Understand Malware Concepts
    Understand Malware Forensics
    Perform Static Malware Analysis
    Analyzing Suspicious Documents
    Perform System Behavior Analysis
    Perform Network Behavior Analysis
    Perform Ransomware Analysis
    Module 10: Investigating Web Attacks

    Understand Web Application Forensics
    Understand Internet Information Services (IIS) Logs
    Understand Apache Web Server Logs
    Detect and Investigate Various Attacks on Web Applications
     Modulel11: Dark Web Forensics

    Understand the Dark Web and Dark Web Forensics
    Determine How to Identify the Traces of Tor Browser during Investigation
    Perform Tor Browser Forensics

     Module12 Cloud Forensics

    Understand Cloud Computing Concepts
    Understand Cloud Forensics
    Understand Amazon Web Services (AWS) Fundamentals
    Perform AWS Forensics
    Understand Microsoft Azure Fundamentals
    Perform Microsoft Azure Forensics
    Understand Google Cloud Fundamentals
    Perform Google Cloud Forensics
     Module13: Email and Social Media Forensics
    Understand Email Basics
    Explain Email Crime Investigation and its Steps
    Understand U.S. Laws Against Email Crime
    Explain Social Media Forensics
    Module14: Mobile Forensics
    Understand Mobile Device Forensics
    Understand Android and iOS Architecture, Boot Process, and File Systems
    Understand Mobile Forensics Process
    Investigate Cellular Network Data
    Perform File System Acquisition
    Understand Phone Locks, Rooting, and Jailbreaking of Mobile Devices
    Perform Logical Acquisition on Mobile Devices
    Perform Physical Acquisition on Mobile Devices
    Perform Android and iOS Forensic Analysis

     Module 15: IoT Forensics

    Understand IoT Concepts
    Perform Forensics on IoT Devices

    Benefits of Forensic Readiness
    Evidence can be gathered to act in the company’s defense if subject to a lawsuit
    In the event of a major incident, a fast and efficient investigation can be conducted and corresponding actions can be followed with minimal disruption to the business
    Extend the target of information security to the wider threat from cybercrime, such as intellectual property protection, fraud, or extortion.
    Improve and make the interface to law enforcement easier.

    Course Audience 
    Information Security Auditor
    All IT professionals involved with information system security, computer forensics, and incident response.
    Anyone interested in learning about Investigating Cyber Crimes

    About the CHFI Exam 
    EC-Council Eligibility Application Non-Refundable  Fee $100
    Exam Voucher – Pearson Vue voucher Fee $1,199 (may change anytime without any prior notice by EC-Council)
    Number of Questions: 150
    Test Duration: 4 Hours
    Test Format: Multiple Choice
    Test Delivery: ECC EXAM
    Exam Prefix: 312-49 (ECC EXAM)

    Additional Material Click here to Download
    CHFI Exam Blueprint
    CHFI Handbook

    Job Interviews Questions 
    Ethical Hacking 115 top Job interview Questions 
    Ethical Hacking Job Interview Questions And Answers
    Cyber Security/ PenTesting Interview Questions and Answers
    Cyber Security Manager Job Interview Questions


    Ethical Hacking Certification Practice Exam Questions 
    Certified Ethical Hacker Practice Exam – Part l
    Certified Ethical Hacker Practice Exam – Part ll
    Certified Ethical Hacker Practice Exam – Part lll
    Certified Ethical Hacker Practice Exam – Part lV
    Certified Ethical Hacker Practice Exam – Part V
    Certified Ethical Hacker Practice Exam – Part Vl
    Certified Ethical Hacker Practice Exam – Part Vll
    Certified Ethical Hacker Practice Exam – Part Vlll
    Certified Ethical Hacker Practice Exam – Part lX

    CompTIA A+ Certification Practice Exam
    CompTIA A+ Certification Exam-I
    CompTIA A+ Certification Exam-II
    CompTIA A+ Certification Exam-III
     

    International Student Training Fee : 500 USD | 1,875 AED | 1,875 SAR (Online Class FEE)

    Job Interview Preparation  (Soft Skills Questions & Answers)
    Tough Open-Ended Job Interview Questions
    What to Wear for Best Job Interview Attire
    Job Interview Question- What are You Passionate About?
    How to Prepare for a Job Promotion Interview

    Stay connected even when you’re apart
    Join our WhatsApp Channel – Get discount offers
     500+ Free Certification Exam Practice Question and Answers
     Your FREE eLEARNING Courses (Click Here)

    Internships, Freelance and Full-Time Work opportunities
     Join Internships and Referral Program (click for details)
    Work as Freelancer or Full-Time Employee (click for details)
    Hire an Intern

    Flexible Class Options

    Week End Classes For Professionals  SAT | SUN
    Corporate Group Trainings Available
    Online Classes – Live Virtual Class (L.V.C), Online Training

    0 Reviews

    Contact form

    Name

    Email *

    Message *