Login

OTP sent to

Computer Hacking Forensics Investigator - CHFI

Home > Courses > Computer Hacking Forensics Investigator - CHFI

Computer Hacking Forensics Investigator - CHFI

EC Council Courses

Duration
45 Hours

Course Description


              A Computer Hacking Forensic Investigator (CHFI) is a cybersecurity professional specializing in the detection and analysis of cyberattacks, and the subsequent collection and preservation of digital evidence for legal proceedings. CHFI certification validates expertise in comprehensive computer forensics, including incident response, electronic evidence collection, and analysis of digital media. 

Course Outline For Computer Hacking Forensics Investigator - CHFI

1. Core concepts and processes 

         The course covers fundamental concepts of computer forensics, including its importance, types of cybercrimes, digital evidence, forensic readiness, and incident response. It details the investigation process from the pre-investigation phase to post-investigation reporting and expert testimony.

              Topics include understanding hard disks, file systems, data acquisition and duplication, and methods to counter anti-forensic techniques like data deletion, steganography, and trail obfuscation. 

2. Operating system forensics 

           The curriculum includes forensics for Windows, Linux, and Mac operating systems. This involves collecting volatile and non-volatile data, analyzing memory and registry in Windows, examining files and metadata, and analyzing event logs.

            For Linux and Mac, it covers analyzing file system images, memory forensics, and parsing metadata. 

3. Specialized forensics 

          Specialized areas covered include network forensics, focusing on fundamentals, readiness, event correlation, and analyzing network traffic and logs. Malware forensics involves understanding different analysis techniques and analyzing various types of malwares.

            The course also addresses investigating web attacks by analyzing web server logs and detecting common vulnerabilities. Other topics include dark web forensics, database forensics, and cloud forensics for platforms like AWS and Azure.

         Investigating email crimes, social media forensics, mobile forensics for Android and iOS devices, and IoT device forensics are also part of the curriculum. 

Enquire Now