Security

Computer Hacking Forensic Investigator (CHFI)

Computer Hacking Forensic Investigator (CHFI)

Computer Hacking Forensic Investigator (CHFI)

The components of the training program include

• Instructor-led

• 8 hours a day for 5 days

• Class Hours:

• Exam Code: 312-49



TBD

Check back often for updates or send us an email at [email protected] so we can notify you of upcoming courses.

Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers.

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

The CHFI program will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal”. It is no longer a matter of “will your or-ganization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

• Certification: Computer Hacking Forensic Investigator v8

• Number of questions: 150

• Length of test: 4 hours

• Passing score: 70%

• Languages: English

• Exam codes: CHFI Exam 312-49

Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities

Section 1. Computer Forensics in Today’s World

Section 2. Computer Forensics Investigation Process

Section 3. Searching and Seizing of Computers

Section 4. Digital Evidence

Section 5. First Responder Procedures

Section 6. Incident Handling

Section 7. Computer Forensics Lab

Section 8. Understanding Hard Disks and File Systems

Section 9. Digital Media Devices

Section 10. CD/DVD Forensics

Section 11. Windows Linux Macintosh Boot Process

Section 12. Windows Forensics I

Section 13. Windows Forensics II

Section 14. Linux Forensics

Section 15. Mac Forensics

Section 16. Data Acquisition and Duplication

Section 17. Recovering Deleted Files and Deleted Partitions

Section 18. Forensics Investigations Using AccessData FTK

Section 19. Forensics Investigations Using Encase

Section 20. Steganography

Section 21. Image Files Forensics

Section 22. Audio file forensics

Section 23. Video File Forensics

Section 24. Application Password Crackers

Section 25. Log Capturing and Event Correlation

Section 26. Network Forensics and Investigating Logs

Section 27. Investigating Network Traffic

Section 28. Router Forensics

Section 29. Investigating Wireless Attacks

Section 30. Investigating Web Attacks

Section 31. Investigating DoS Attacks

Section 32. Investigating virus, Trojan, spyware and Rootkit Attacks

Section 33. Investigating Internet Crimes

Section 34. PDA Forensics

Section 35. Blackberry Forensics

Section 36. iPod and iPhone Forensics

Section 37. Cell Phone Forensics

Section 38. USB Forensics

Section 39. Printer Forensics

Section 40. Investigating Corporate Espionage

Section 41. Investigating Computer Data Breaches

Section 42. Investigating Trademark and Copyright Infringement

Section 43. Investigating Sexual Harassment Incidents

Section 44. Investigating Child Pornography Cases

Section 45. Investigating Identity Theft Cases

Section 46. Investigating Defamation over Websites and Blog Postings

Section 47. Investigating Social Networking Websites for Evidences

Section 48. Investigation Search Keywords

Section 49. Investigative Reports

Section 50. Becoming an Expert Witness

Section 51. How to Become a Digital Detective

Section 52. Computer Forensics for Lawyers

Section 53. Law and Computer Forensics

Section 54. Computer Forensics and Legal Compliance

Section 55. Security Policies

Section 56. Risk Assessment

Section 57. Evaluation and Certification of Information Systems

Section 58. Ethics in Computer Forensics

Section 59. Computer Forensic Tools

Section 60. Windows Based Command Line Tools

Section 61. Windows Based GUI Tools

Section 62. Forensics Frameworks

Section 63. Forensics Investigation Templates

Section 64. Computer Forensics Consulting Companies