1

CHFI Course

Computer Hacking Forensic Investigator (CHFI) Training

A CHFI is a skilled professional trained in the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. CHFI professionals are aware of legally sound detailed methodological approach to computer forensics and evidence analysis.

Computer Hacking Forensic Investigation (CHFI) is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program.


CHFI Course Key Learning 

  • Understanding Investigation processes in Computer forensics
  • Legal issues involved in investigations
  • Searching evidence and digital handprints
  • Methodologies of Acquisition and seizing
  • Digital evidence, their types, examination processes
  • Electronic crime and their categories
  • Electronic crime scene evaluation, acquiring and conducting primary interviews
  • Electronic evidence preservation and reporting crime scenes
  • Setting up forensic lab in computer
  • Knowledge of windows, linux and mac boot up
  • File systems and their differences, booting a failed hard drive
  • Volatile and non-volatile information gatherings
  • Recover deleted files and hard dusk partitions
  • Steganography, Steganalysis and forensics of image files
  • Concepts of password cracking and investigating password attacks
  • Investigate log files and determining the root cause
  • Access Data FTK expertise
  • Attacks on wireless and related issues
  • E-mail crimes, its investigation and recovery of deleted mails
  • Writing investigative reports

Course Content:

 Module1: Computer Forensics in Today’s World

  • Understand the Fundamentals of Computer Forensics
  • Understand Cybercrimes and their Investigation Procedures
  • Understand Digital Evidence and eDiscovery
  • Understand Forensic Readiness
  • Understand the Role of Various Processes and Technologies in Computer Forensics
  • Identify the Roles and Responsibilities of a Forensic Investigator
  • Understand the Challenges Faced in Investigating Cybercrimes
  • Understand Various Standards and Best Practices Related to Computer Forensics
  • Understand Laws and Legal Compliance in Computer Forensics

Module2Computer Forensics Investigation Process

  • Understand the Forensic Investigation Process and its Importance
  • Understand First Response
  • Understand the Pre-investigation Phase
  • Understand the Investigation Phase
  • Understand the Post-investigation Phase

 Module3: Understanding Hard Disks and File Systems

  • Describe Different Types of Disk Drives and their Characteristics
  • Explain the Logical Structure of a Disk
  • Understand the Booting Process of Windows, Linux, and macOS Operating Systems
  • Understand Various File Systems of Windows, Linux and macOS Operating Systems
  • Understand File System Analysis
  • Understand Storage Systems
  • Understand Encoding Standards and Hex Editors
  • Analyze Popular File Formats Using Hex Editor

Module4: Data Acquisition and Duplication

  • Understand Data Acquisition Fundamentals
  • Understand eDiscovery
  • Understand Data Acquisition Methodology
  • Prepare an Image File for Examination

 Module5 Defeating Anti-forensics Techniques

  • Understand Anti-forensics Techniques
  • Discuss Data Deletion and Recycle Bin Forensics
  • Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
  • Explore Password Cracking/Bypassing Techniques
  • Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
  • Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
  • Detect Program Packers and Footprint Minimizing Techniques

 Module6 :Windows Forensics

  • Understand Windows Forensics
  • Collect Volatile Information
  • Collect Non-volatile Information
  • Perform Windows Memory Analysis
  • Perform Windows Registry Analysis
  • Perform Electron Application Analysis
  • Perform Web Browser Forensics
  • Examine Windows Files and Metadata
  • Understand ShellBags, LNK Files, and Jump Lists
  • Understand Text-based Logs and Windows Event Logs

Module7: Linux and Mac Forensics

  • Collect Volatile Information in Linux
  • Collect Non-volatile Information in Linux
  • Understand Linux Memory Forensics
  • Understand Mac Forensics
  • Collect Volatile Information in Mac
  • Collect Non-volatile Information in Mac
  • Understand Mac Memory Forensics and Mac Forensics Tools

Module8: Network Forensics

  • Understand Network Forensics
  • Summarize Event Correlation Concepts
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  • Perform Incident Detection and Examination Using SIEM Tools
  • Understand Wireless Network Forensics
  • Detect and Investigate Wireless Network Attacks

Module9 Malware Forensics

  • Understand Malware Concepts
  • Understand Malware Forensics
  • Perform Static Malware Analysis
  • Analyzing Suspicious Documents
  • Perform System Behavior Analysis
  • Perform Network Behavior Analysis
  • Perform Ransomware Analysis

Module10: Investigating Web Attacks

  • Understand Web Application Forensics
  • Understand Internet Information Services (IIS) Logs
  • Understand Apache Web Server Logs
  • Detect and Investigate Various Attacks on Web Applications

Module11: Dark Web Forensics

  • Understand the Dark Web and Dark Web Forensics
  • Determine How to Identify the Traces of Tor Browser during Investigation
  • Perform Tor Browser Forensics

Module12: Cloud Forensics

  • Understand Cloud Computing Concepts
  • Understand Cloud Forensics
  • Understand Amazon Web Services (AWS) Fundamentals
  • Perform AWS Forensics
  • Understand Microsoft Azure Fundamentals
  • Perform Microsoft Azure Forensics
  • Understand Google Cloud Fundamentals
  • Perform Google Cloud Forensics

Module13 :Email and Social Media Forensics

  • Understand Email Basics
  • Explain Email Crime Investigation and its Steps
  • Understand U.S. Laws Against Email Crime
  • Explain Social Media Forensics

Module14 Mobile Forensics

  • Understand Mobile Device Forensics
  • Understand Android and iOS Architecture, Boot Process, and File Systems
  • Understand Mobile Forensics Process
  • Investigate Cellular Network Data
  • Perform File System Acquisition
  • Understand Phone Locks, Rooting, and Jailbreaking of Mobile Devices
  • Perform Logical Acquisition on Mobile Devices
  • Perform Physical Acquisition on Mobile Devices
  • Perform Android and iOS Forensic Analysis

Module15 :IoT Forensics

  • Understand IoT Concepts
  • Perform Forensics on IoT Devices

Benefits of Forensic Readiness

  • Evidence can be gathered to act in the company’s defense if subject to a lawsuit
  • In the event of a major incident, a fast and efficient investigation can be conducted and corresponding actions can be followed with minimal disruption to the business
  • Extend the target of information security to the wider threat from cybercrime, such as intellectual property protection, fraud, or extortion.
  • Improve and make the interface to law enforcement easier.

Course Audience 

  • Information Security Auditor
  • All IT professionals involved with information system security, computer forensics, and incident response.
  • Anyone interested in learning about Investigating Cyber Crimes

About the CHFI Exam 

  • EC-Council Eligibility Application Non-Refundable  Fee $100
  • Exam Voucher – Pearson Vue voucher Fee $1,199 (may change anytime without any prior notice by EC-Council)
  • Number of Questions: 150
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM
  • Exam Prefix: 312-49 (ECC EXAM)

Additional Material Click here to Download


Job Interviews Questions 


🎥 Your FREE eLEARNING Courses (Click Here)


Ethical Hacking Certification Practice Exam Questions 


CompTIA A+ Certification Practice Exam

 


International Student Training Fee : 500 USD | 1,875 AED | 1,875 SAR (Online Class FEE)


Flexible Class Options

  • Evening Classes | Corporate Workshops | Fast-Track
  • Week End Classes For Professionals  SAT | SUN
  • Online Classes – Live Virtual Class (L.V.C), Online Training

Related Courses

Offensive Security Certified Professional (OSCP) 

Ethical Hacking Course
Certified Information Security Manager (CISM)
CISA: Certified Information Systems Auditor Exam

Penetration Testing Certificate Training Services
ISO 27001 Information Security Management Systems – ISMS
ISO 27017-Information Security Controls for Cloud Services
ISO 22301 – ISMS Lead Auditor


Cyber Security is all about trusted relationships, from the time we first meet, we’ll be focused on helping you to improve your compliance and security posture, take advantage of the latest technology innovations, stay ahead of malicious threats, and drive efficiencies in service delivery across your business. OMNI cyber security experts are dedicated to your success, we are happy to provide you a FREE Cyber Security Assessment – contact us +92.213.4986664, +92.312.2169325

Click here to get Expert Advise from our Information Security Service Expert (Cyber Security Services)


KEY FEATURES

Flexible Classes Schedule

Online Classes for out of city / country students

Unlimited Learning - FREE Workshops

FREE Practice Exam

Internships Available

Free Course Recordings Videos

Register Now