(0)
1-855-732-3348
+
Learn About Our CCSK X CCSP Training Week

Computer Hacking Forensic Investigator

Course Image

iLearn Self-Paced

Duration: CPE Credits: 40 Course Number:

Download Brochure (.pdf)
Request Group Training

Schedule + Register

About this Course

The Computer Hacking Forensic Investigator (C|HFI) self-paced training delivers the security discipline of digital forensics from a vendor-neutral perspective. C|HFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

Register now

Course Overview+ Show

CHFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

 

Module 1 | Computer Forensics in Today’s World                                                                

Module 2 |Computer Forensics Investigation Process                                                                       

Module 3 | Understanding Hard Disks and File Systems                                                                       

Module 4 | Data Acquisition and Duplication                                                            

Module 5 | Defeating Anti-forensics Techniques                                                                   

Module 6 | Windows Forensics                                                                     

Module 7 | Linux and Mac Forensics                                                            

Module 8 | Network Forensics                                                                       

Module 9 | Malware Forensics                                                          

Module 10 | Investigating Web Attacks                                                                     

Module 11 | Dark Web Forensics                                                                  

Module 12 | Cloud Forensics                                                            

Module 13 | Email and Social Media Forensics                                                                    

Module 14 | Mobile Forensics                                                           

Module 15 | IoT Forensics                 


What's Included+ Show

Self-Paced Learning, Anytime, Anywhere.

iLearn Training Includes:  

  • 365 Day Subscription
  • Official C|HFI Steaming Video Course
  • Official C|HFI eCourseware
  • CyberQ Labs (6 Months)
  • Certificate of Completion
  • Certification Exam Voucher

This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses, such as CEH, in a streaming video format. All lectures are delivered by a professional practitioner to assure a real-world perspective on the course concepts.


Learning Objectives+ Show

At the end of this course, learners will be able to:

  • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
  • Perform anti-forensic methods detection
  • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
  • Recover deleted files and partitions in Windows, Mac OS X, and Linux
  • Conduct reverse engineering for known and suspected malware files
  • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents


Who Should Attend+ Show

The CHFI certification gives participants (Law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.) the necessary skills to perform an effective digital forensics investigation.

  • Cyber Threat Intelligence Analyst
  • Cyber Security Analyst, Senior
  • Forensic Analyst
  • Investigative Analyst
  • Vulnerability Analyst, Principal
  • Incident Response
  • Security Control Assessor
  • Intrusion Analyst
  • Digital Forensics Analyst
  • Penetration Tester


Upcoming Schedule

| On-Demand

USD $2,199.00

Questions? Chat with us or get in touch.

Course Categories:
CCSK | CCSP: The Industry’s Leading Cloud Security Certifications - learn more

Upgrade your Skills. Secure your Potential.

Our experts provide hands-on and on-demand training that helps IT and data security professionals meet today's cyber security challenges and prepares you for a successful future.

Training Schedule Contact Us