Live Webinar - Cybersecurity Career Advancement & Protecting Organizations


Computer Hacking Forensic Investigator v9

Course Details
Code: CHFIv9
Tuition (USD): $3,895.00 • Virtual (5 days)
$3,795.00 • Classroom (5 days)

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and the course enables students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.

The CHFI certification will give participates (Law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.) the necessary skills to perform an effective digital forensics investigation.

CHFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

  • Certification exam voucher included

Skills Gained

Students going through CHFI training will learn to:

  • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
  • Perform anti-forensic methods detection
  • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
  • Identify & check the possible source / incident origin.
  • Recover deleted files and partitions in Windows, Mac OS X, and Linux
  • Conduct reverse engineering for known and suspected malware files
  • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Who Can Benefit

  • Law Enforcement
  • Defense & Military
  • e-Business Security
  • Systems Administrators
  • Legal Professionals
  • Banking & Insurance
  • Government Agencies
  • IT Managers

Course Details

Course Outline

  • Computer Forensics in Today's World
  • Learning about Computer Crime Policies, Programs, and Computer Forensics Laws
  • Reporting a Cybercrime to the FBI
  • Case Study: Child Pornography
  • Additional Reading Material
  • Computer Forensics Investigation Process
  • Recovering Data Using the Recover My Files Tool
  • Performing Hash, Checksum, or HMAC Calculations Using the HashCalc Tool
  • Generating MD5 Hashes Using MD5 Calculator
  • Additional Reading MaterialComputer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Operating System Forensics
  • Defeating Anti- forensics Techniques
  • Data Acquisition and Duplication
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports