Computer Hacking Forensics Investigator - CHFI

EC-Council | CHFI | Computer Hacking Forensics Investigator

Computer Hacking Forensics Investigator - CHFI

Vendor:  EC-Council

Upcoming classes: See Class Calendar

Class Overview

Every crime leaves a digital footprint and with EC Council’s Computer Hacking Forensic Investigator , or C|HFI® training, you will learn to unravel these pieces of evidence, decode them, and report them.

From decoding a hack to taking legal action against the perpetrators, you will be an active respondent in times of cyber-breaches.

C|HFI includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, C|HFI training walks students through every step of the process with experiential learning.

C|HFI Course:
- ANSI 17024 accredited certification program
- Mapped to the NICE 2.0 framework
- Recognized by the DoD under Directive 8570

Class Details

Objectives



To increase the knowledge of cybercrime and investigation methodologies for Cyber Security and Forensics professionals.

Prerequisite Knowledge Advisory

IT and/or Forensics professionals with:
- knowledge of IT/cybersecurity, computer forensics, and incident response
- knowledge of threat vectors

Exam Required for C|HFI Certification



Exam title: Computer Hacking Forensic Investigator
Proctor: EC-Council Exam Portal

C|HFI Certification Training Class Outline



Module 1: Computer Forensics in Today’s World
Module 2: Computer Forensics Investigation Process
Module 3: Understanding Hard Disks and File Systems
Module 4: Data Acquisition and Duplication
Module 5: Defeating Anti-Forensics Techniques
Module 6: Windows Forensics
Module 7: Linux and Mac Forensics
Module 8: Network Forensics
Module 9: Investigating Web Attacks
Module 10: Dark Web Forensics
Module 11: Database Forensics
Module 12: Cloud Forensics
Module 13: Investigating Email Crimes
Module 14: Malware Forensics
Module 15: Mobile Forensics
Module 16: IoT Forensics

Share by: