Study Learn Grow
Computer Hacking Forensic Investigator (CHFI)

Computer Hacking Forensic Investigator (CHFI)


Train with E-Courses4you to become a Computer Hacking Forensic Investigator (CHFI)!

Overview

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defence and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. Certificate of achievement rewarded at the end of completion.

Course Information

Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government, and corporate entities globally and many of them turn to EC-Council for our Digital Forensic Investigator CHFI Certification Program.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.
MODULES
Module 1 Introduction
Module 2 Computer Forensics in Todays World
Module 3 Computer Forensics Investigation Process
Module 4 Digital Evidence
Module 5 First Responder Procedures
Module 6 Computer Forensics Lab
Module 7 Understanding Hard Disks and File Systems
Module 8 Windows Forensics
Module 9 Data Acquisition and Duplication
Module 10 Recovering Deleted Files and Deleted Partitions
Module 11 Using AccessData FTK 02
Module 12 Steganography and Image File Forensics
Module 13 Application Password Crackers
Module 14 Log Capturing and Event Correlation
Module 15 Network Forensics and Investigating Network Traffic
Module 16 Investigating Wireless Attacks
Module 17 Investigating Web Attacks
Module 18 Tracking Emails and Investigating Email Crimes
Module 19 Mobile Forensics
Module 20 Investigative Reports
Module 21 Becoming an Expert Witness
Module 22 Lab Introduction.

Who is this course for? Anyone with an interest in a career in IT or Cyber Security.
 

There are no official pre-requisites for this course but we recommend students have a basic knowledge of the English language, and computer skills.

• Penetration Tester
• Cyber Security Analyst
• Ethical Hacker
• Security Architect
• Information Security Officer
• Security Consultant
• Senior Security Consultant
 

You are able to pay in full upfront, or in monthly installments (subject to a credit check.) 

Course Specifications

Online education is electronically supported learning that relies on the Internet for teacher/student interaction. 

See All Courses

Numerous Cyber Security courses include ethical hacking, CompTIA and forensics. 

See All Courses

An academic certificate is a document that certifies that a person has received specific education or has passed a test or series of tests.

See All Courses

Certifications are official documents attesting to a level of achievement. 

See All Courses

Course duration is from 2 days to 1 week.

See All Courses

Thinking of online study? StudyLearnGrow provides numerous distance learning courses.

See All Courses

Adult education is the non-credential activity of gaining skills and improved education. 

See All Courses

Any Other

See All Courses

Study Learn Grow

Related Courses