CCIE DC V2 Success: Mr. Tejas CCIE Data Center #57408, Mr. Ankit Verma CCIE Data Center #57200, Mr. Keval Smart CCIE Data Center #56915, Mr. Vijay Pandey CCIE Data Center #56720, Mr. Victor Ade Adeboje CCIE Data Center, #56196 Mr. Binoy CCIE Data Center #56657, Mr. Muruguppan CCIE Data Center #56434, Mr. Pritish Patil CCIE Data Center #56048
HOME > About
  • About The Course
  • Course Objectives
  • Audience
About CHFI

EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. The Computer Hacking Forensic Investigator (CHFI) is a comprehensive course that covers major forensic investigation scenarios. The course is intended to deliver security disciplines from a vendor neutral perspective. It ensures the participants to gain hands on experience with various forensic investigation techniques and tools to perform apt investigations that would lead to prosecution of perpetrators. CHFI is targeted to provide a methodological approach to computer forensics which includes searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence etc.

It intends to fortify the knowledge of the participants so as to perform effective digital forensics investigation.

As Cyber war is already on, it has given rise to Cyber security as a profession. The growth in this profession has been tremendous and noticeable.  EC-Council has been a leader in this domain. With the commencement of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate these days. Therefore, Network Defense Practices, Ethical Hacking, and Penetration Testing have proven to be the pillars of cyber security teams across the globe and Digital Forensics cannot be left behind. Doesn’t matter you operate a team of 2 or 2,000 it becomes high priority to tackle the cyber issues being faced by the organizations. Hence, digital forensics must forma a part of the organization’s staffs’ skill and daily practice.

The CHFI training program helps the participants to excel and acquire skills in digital evidence acquisition, handling and analysis in a forensically sound manner. Understanding the fact that it is fully acceptable in a court of law, the acquired skills through this program leads to better prosecutions of security incidents like data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

Course Objectives

Upon course completion, participants would be able to:

  • Have a better understanding of the concept of forensic science, cyber crime, and steps in forensic investigation
  • Gain knowledge of the laws involved and work accordingly to search and seize the computers with a warrant
  • List roles of first responder, evaluate electronic crime scene, conduct preliminary interviews, collect, preserve and transport electronic evidence along with complete documentation
  • Define different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • Set computer forensics lab
  • Retrieve existing and deleted files from different operation systems using different processes such as
  • Access Data FTK, Encase, Steganography and other techniques
  • Crack system and application passwords
  • Perform log capturing to establish event correlation
  • Investigate network traffic, emails, and attacks
  • Practice forensic process on mobile devices with different operating systems
Course Modules
  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation using Access Data FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness

Come join the stream of Cyber Security. Earn your certification now!!

Audience to the Course
  • The course is intended for the following:
  • Law enforcement personnel
  • System administrators
  • Security officers
  • Defense and military personnel
  • Legal professionals
  • Bankers
  • Security professionals
  • And anyone who is concerned about the integrity of the network infrastructure

Prerequisites

Candidates securing CEH certification can undergo CHFI training program.

Exams

CHFI Exam (312-49)

Apply for this Course

Enquire Now
FREE WEEKLY UPDATES
Get the latest content first.
We respect your privacy.

Stay updated with upcoming training opportunities.

Latest Results and updated information on new Course Launch.Be the first one to know.