Read more
2 Month/20 Hours Price:1450,000
140,000
Computer Hacking Forensic Investigator (CHFI) Training
A CHFI is a skilled professional trained in the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. CHFI professionals are aware of legally sound detailed methodological approach to computer forensics and evidence analysis.
Computer Hacking Forensic Investigation (CHFI) is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program.
Understanding Investigation processes in Computer forensics
Legal issues involved in investigations
Searching evidence and digital handprints
Methodologies of Acquisition and Seizing
Digital evidence, their types, examination processes
Electronic crime and its categories
Electronic crime scene evaluation, acquiring and conducting primary interviews
Electronic evidence preservation and reporting crime scenes
Setting up a forensic lab in computer
Knowledge of Windows, Linux, and mac boot-up
File systems and their differences, booting a failed hard drive
Volatile and non-volatile information gatherings
Recover deleted files and hard disk partitions
Steganography, Steganalysis and forensics of image files
Concepts of password cracking and investigating password attacks
Investigate log files and determine the root cause
Access Data FTK expertise
Attacks on wireless and related issues
E-mail crimes, its investigation and recovery of deleted mail
Writing investigative reports
Understanding the need for digital forensics
Types of computer crimes
Legal issues and considerations
Challenges in computer forensics
Module 2: Computer Forensics Investigation Process
Steps in computer forensics investigations
Creating an investigation plan
Roles of a computer forensic investigator
Investigation methodology
Module3: Understanding Hard Disks and File Systems
Describe Different Types of Disk Drives and their Characteristics
Explain the Logical Structure of a Disk
Understand the Booting Process of Windows, Linux, and macOS Operating Systems
Understand Various File Systems of Windows, Linux and macOS Operating Systems
Understand File System Analysis
Understand Storage Systems
Understand Encoding Standards and Hex Editors
Analyze Popular File Formats Using Hex Editor
Module4: Data Acquisition and Duplication
Understand Data Acquisition Fundamentals
Understand eDiscovery
Understand Data Acquisition Methodology
Prepare an Image File for Examination
Module5: Defeating Anti-forensics Techniques
Understand Anti-forensics Techniques
Discuss Data Deletion and Recycle Bin Forensics
Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
Explore Password Cracking/Bypassing Techniques
Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
Detect Program Packers and Footprint Minimizing Techniques
Module6: Windows Forensics
Understand Windows Forensics
Collect Volatile Information
Collect Non-volatile Information
Perform Windows Memory Analysis
Perform Windows Registry Analysis
Perform Electron Application Analysis
Perform Web Browser Forensics
Examine Windows Files and Metadata
Understand ShellBags, LNK Files, and Jump Lists
Understand Text-based Logs and Windows Event Logs
Module7: Linux and Mac Forensics
Collect Volatile Information in Linux
Collect Non-volatile Information in Linux
Understand Linux Memory Forensics
Understand Mac Forensics
Collect Volatile Information in Mac
Collect Non-volatile Information in Mac
Understand Mac Memory Forensics and Mac Forensics Tools
Module8 Network Forensics
Understand Network Forensics
Summarize Event Correlation Concepts
Identify Indicators of Compromise (IoCs) from Network Logs
Investigate Network Traffic
Perform Incident Detection and Examination Using SIEM Tools
Understand Wireless Network Forensics
Detect and Investigate Wireless Network Attacks
Module 9 Malware Forensics
Understand Malware Concepts
Understand Malware Forensics
Perform Static Malware Analysis
Analyzing Suspicious Documents
Perform System Behavior Analysis
Perform Network Behavior Analysis
Perform Ransomware Analysis
Module 10: Investigating Web Attacks
Understand Web Application Forensics
Understand Internet Information Services (IIS) Logs
Understand Apache Web Server Logs
Detect and Investigate Various Attacks on Web Applications
Modulel11: Dark Web Forensics
Understand the Dark Web and Dark Web Forensics
Determine How to Identify the Traces of Tor Browser during Investigation
Perform Tor Browser Forensics
Module12 Cloud Forensics
Understand Cloud Computing Concepts
Understand Cloud Forensics
Understand Amazon Web Services (AWS) Fundamentals
Perform AWS Forensics
Understand Microsoft Azure Fundamentals
Perform Microsoft Azure Forensics
Understand Google Cloud Fundamentals
Perform Google Cloud Forensics
Module13: Email and Social Media Forensics
Understand Email Basics
Explain Email Crime Investigation and its Steps
Understand U.S. Laws Against Email Crime
Explain Social Media Forensics
Module14: Mobile Forensics
Understand Mobile Device Forensics
Understand Android and iOS Architecture, Boot Process, and File Systems
Understand Mobile Forensics Process
Investigate Cellular Network Data
Perform File System Acquisition
Understand Phone Locks, Rooting, and Jailbreaking of Mobile Devices
Perform Logical Acquisition on Mobile Devices
Perform Physical Acquisition on Mobile Devices
Perform Android and iOS Forensic Analysis
Module 15: IoT Forensics
Understand IoT Concepts
Perform Forensics on IoT Devices
Benefits of Forensic Readiness
Evidence can be gathered to act in the company’s defense if subject to a lawsuit
In the event of a major incident, a fast and efficient investigation can be conducted and corresponding actions can be followed with minimal disruption to the business
Extend the target of information security to the wider threat from cybercrime, such as intellectual property protection, fraud, or extortion.
Improve and make the interface to law enforcement easier.
Course Audience
Information Security Auditor
All IT professionals involved with information system security, computer forensics, and incident response.
Anyone interested in learning about Investigating Cyber Crimes
About the CHFI Exam
EC-Council Eligibility Application Non-Refundable Fee $100
Exam Voucher – Pearson Vue voucher Fee $1,199 (may change anytime without any prior notice by EC-Council)
Number of Questions: 150
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM
Exam Prefix: 312-49 (ECC EXAM)
Additional Material Click here to Download
CHFI Exam Blueprint
CHFI Handbook
Job Interviews Questions
Ethical Hacking 115 top Job interview Questions
Ethical Hacking Job Interview Questions And Answers
Cyber Security/ PenTesting Interview Questions and Answers
Cyber Security Manager Job Interview Questions
Ethical Hacking Certification Practice Exam Questions
Certified Ethical Hacker Practice Exam – Part l
Certified Ethical Hacker Practice Exam – Part ll
Certified Ethical Hacker Practice Exam – Part lll
Certified Ethical Hacker Practice Exam – Part lV
Certified Ethical Hacker Practice Exam – Part V
Certified Ethical Hacker Practice Exam – Part Vl
Certified Ethical Hacker Practice Exam – Part Vll
Certified Ethical Hacker Practice Exam – Part Vlll
Certified Ethical Hacker Practice Exam – Part lX
CompTIA A+ Certification Practice Exam
CompTIA A+ Certification Exam-I
CompTIA A+ Certification Exam-II
CompTIA A+ Certification Exam-III
International Student Training Fee : 500 USD | 1,875 AED | 1,875 SAR (Online Class FEE)
Job Interview Preparation (Soft Skills Questions & Answers)
Tough Open-Ended Job Interview Questions
What to Wear for Best Job Interview Attire
Job Interview Question- What are You Passionate About?
How to Prepare for a Job Promotion Interview
Stay connected even when you’re apart
Join our WhatsApp Channel – Get discount offers
500+ Free Certification Exam Practice Question and Answers
Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities
Join Internships and Referral Program (click for details)
Work as Freelancer or Full-Time Employee (click for details)
Hire an Intern
Flexible Class Options
Week End Classes For Professionals SAT | SUN
Corporate Group Trainings Available
Online Classes – Live Virtual Class (L.V.C), Online Training
Offensive Security Certified Professional (OSCP)
Ethical Hacking Course
Certified Information Security Manager (CISM)
CISA: Certified Information Systems Auditor Exam
Penetration Testing Certificate Training Services
ISO 27001 Information Security Management Systems – ISMS
ISO 27017-Information Security Controls for Cloud Services
ISO 22301 – ISMS Lead Auditor
0 Reviews