CHFI: Computer Hacking Forensic Investigator
“CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths.”
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition,handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.
The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.
It is strongly recommended that you have attended the CEH class (Certified Ethical Hacker) before enrolling into CHFI program.
About the instructor: Robert Petrunic
Robert is a high profiled technology trainer and practitioner. He has broad experience in security, forensics and penetration testing, virtualization (both Microsoft and VMware), and all the flavors of Microsoft Windows server OS. He is a certified trainer for several leading companies: MCT (Microsoft Certified Trainer), VCI (VMware Certified Instructor), CEI (Certified EC Council Instructor) and ISC2 trainer (CISSP).
Specialties: Security and virtualization. Transferring knowledge in this Field to other People is at the top of my interests.
- The computer forensic investigation process and the various legal issues involved
- Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
- Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
- Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene
- How to set up a computer forensics lab and the tools involved in it
- Various file systems and how to boot a disk
- Gathering volatile and nonvolatile information from Windows
- Data acquisition and duplication rules, validation methods and tools required
- How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
- The process involved in forensic investigation using AccessData FTK and EnCase
- Steganography and its techniques, Steganalysis, and image file forensics
- Password Cracking Concepts, tools, types of password attacks and how to investigate password protected files
- Different types of log capturing, log management, time synchronization, and log capturing tools
- How to investigate logs, network traffic, wireless attacks, and web attacks
- How to track e-mails and investigate e-mail crimes
- Mobile forensics and mobile forensics software and hardware tools
- How to write investigative reports
CHFIv8 curriculum consists of 22 instructor-led training modules.
1. Computer Forensics in Today’s World
2. Computer Forensics Investigation Process
3. Searching and Seizing Computers
4. Digital Evidence
5. First Responder Procedures
6. Computer Forensics Lab
7. Understanding Hard Disks and File Systems
8. Windows Forensics
9. Data Acquisition and Duplication
10. Recovering Deleted Files and Deleted Partitions
11. Forensics Investigation Using AccessData FTK
12. Forensics Investigation Using EnCase
13. Steganography and Image File Forensics
14. Application Password Crackers
15. Log Capturing and Event Correlation
16. Network Forensics, Investigating Logs and Investigating Network Traffic
17. Investigating Wireless Attacks
18. Investigating Web Attacks
19. Tracking Emails and Investigating Email Crimes
20. Mobile Forensics
21. Investigative Reports
22. Becoming an Expert Witness
Read more about CHFI
This training will prepare you for the CHFI 312-49 exam (exam is optional and the exam fee is NOT included in the price).
When you pass this exam you will receive the CHFI certification.
You can book and take the exam at Glasspaper`s test center in Oslo, Bergen and Trondheim, or any other test center (Prometric or VUE).
- Number of Questions: 150
- Passing Score: 70%
- Test Duration: 4 Hours
- Test Format: Multiple Choice
Other relevant courses