Computer Hacking Forensic Investigator (CHFI)
The components of the training program include
• Instructor-led
• 8 hours a day for 5 days
• Class Hours:
• Exam Code: 312-49
TBD
Check back often for updates or send us an email at [email protected] so we can notify you of upcoming courses.
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers.
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.
The CHFI program will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal”. It is no longer a matter of “will your or-ganization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.
• Certification: Computer Hacking Forensic Investigator v8
• Number of questions: 150
• Length of test: 4 hours
• Passing score: 70%
• Languages: English
• Exam codes: CHFI Exam 312-49
Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities
Section 1. Computer Forensics in Today’s World
Section 2. Computer Forensics Investigation Process
Section 3. Searching and Seizing of Computers
Section 4. Digital Evidence
Section 5. First Responder Procedures
Section 6. Incident Handling
Section 7. Computer Forensics Lab
Section 8. Understanding Hard Disks and File Systems
Section 9. Digital Media Devices
Section 10. CD/DVD Forensics
Section 11. Windows Linux Macintosh Boot Process
Section 12. Windows Forensics I
Section 13. Windows Forensics II
Section 14. Linux Forensics
Section 15. Mac Forensics
Section 16. Data Acquisition and Duplication
Section 17. Recovering Deleted Files and Deleted Partitions
Section 18. Forensics Investigations Using AccessData FTK
Section 19. Forensics Investigations Using Encase
Section 20. Steganography
Section 21. Image Files Forensics
Section 22. Audio file forensics
Section 23. Video File Forensics
Section 24. Application Password Crackers
Section 25. Log Capturing and Event Correlation
Section 26. Network Forensics and Investigating Logs
Section 27. Investigating Network Traffic
Section 28. Router Forensics
Section 29. Investigating Wireless Attacks
Section 30. Investigating Web Attacks
Section 31. Investigating DoS Attacks
Section 32. Investigating virus, Trojan, spyware and Rootkit Attacks
Section 33. Investigating Internet Crimes
Section 34. PDA Forensics
Section 35. Blackberry Forensics
Section 36. iPod and iPhone Forensics
Section 37. Cell Phone Forensics
Section 38. USB Forensics
Section 39. Printer Forensics
Section 40. Investigating Corporate Espionage
Section 41. Investigating Computer Data Breaches
Section 42. Investigating Trademark and Copyright Infringement
Section 43. Investigating Sexual Harassment Incidents
Section 44. Investigating Child Pornography Cases
Section 45. Investigating Identity Theft Cases
Section 46. Investigating Defamation over Websites and Blog Postings
Section 47. Investigating Social Networking Websites for Evidences
Section 48. Investigation Search Keywords
Section 49. Investigative Reports
Section 50. Becoming an Expert Witness
Section 51. How to Become a Digital Detective
Section 52. Computer Forensics for Lawyers
Section 53. Law and Computer Forensics
Section 54. Computer Forensics and Legal Compliance
Section 55. Security Policies
Section 56. Risk Assessment
Section 57. Evaluation and Certification of Information Systems
Section 58. Ethics in Computer Forensics
Section 59. Computer Forensic Tools
Section 60. Windows Based Command Line Tools
Section 61. Windows Based GUI Tools
Section 62. Forensics Frameworks
Section 63. Forensics Investigation Templates
Section 64. Computer Forensics Consulting Companies