EC-Council Computer Hacking Forensic Investigator v8: CHFI

EC-Council Computer Hacking Forensic Investigator v8: CHFI Course Description

Duration: 5.00 days (40 hours)

Organizations, corporate bodies and governments are conscious of the threat posed by cyber-crime in today's times. This has mandated the need for advanced cyber security and investigation procedure, which is vital to identify, track and prosecute cyber criminals.

EC-Council Computer Hacking Forensic Investigator v8: CHFI training courses are specifically designed for information security aspirants who are looking to brush up their skills in forensic investigation, digital evidence acquisition and analysis of the hacker attack. NetCom Learning offers the latest, vendor-neutral CHFI v8 training, complete with hands-on experience, assessments and round-the-clock study access support.

The CHFI training and certification classes will enhance the participant's skills in multiple facets of cyber investigation, including data breaches, insider threats, corporate espionages, conducting audits and prevention of future attacks. Gain in-depth knowledge of the latest tools and techniques used across the world for forensic investigation process and prepare for CHFI certification exams.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this EC-Council Computer Hacking Forensic Investigator v8: CHFI Course

  • » Forensic Investigators
  • » Law enforcement personnel
  • » Police and military personnel
  • » System administrators
  • » Legal professionals
  • » Banking and Insurance professionals
  • » Government agencies professionals
  • » e-Business security professionals
  • » IT professionals involved with incident response

Back to Top

Course Prerequisites for EC-Council Computer Hacking Forensic Investigator v8: CHFI

  • » Working knowledge of TCP/IP
  • » Knowledge and skills related to managing Windows / Unix / Linux systems
  • » Information security background
  • » CEH certification recommended

Back to Top

EC-Council Computer Hacking Forensic Investigator v8: CHFI Course Objectives

  • » Understanding cyber-crime investigation, cyber law, and how to obtain search warrant
  • » Collecting and examining digital evidence, rules of digital evidence and different types of digital evidence
  • » Understanding first responder duties, first responder toolkit, securing, evaluating and documenting electronic crime scene
  • » Learn and understand types of password attacks password cracking concepts, decode password breaches
  • » Understand investigation techniques related to emails & phishing, track emails, web attacks, network traffic breaches, wireless attacks and logs
  • » Learn to recover deleted files on different platforms, including Linux, Windows and Mac OS X
  • » Understand forensic investigation with Encase Steganography, Steganalysis, Access Data Forensic Toolkit (FTK) and image file forensics

Back to Top

EC-Council Computer Hacking Forensic Investigator v8: CHFI Course Outline

      1. Module 01: Computer Forensics in Today's World
        1. Forensics Science
        2. Computer Forensics
        3. Forensics Readiness
        4. Cyber Crime
        5. Cost Expenditure Responding to the Security Incident
        6. Cyber Crime Investigation
        7. Corporate Investigations
        8. Reporting a Cyber Crime
      2. Module 02: Computer Forensics Investigation Process
        1. Investigating Computer Crime
        2. Evaluate and Secure the Scene
        3. Collect the Evidence
        4. Secure the Evidence
        5. Acquire the Data
        6. Analyze the Data
        7. Assess Evidence and Case
        8. Prepare the Final Report
        9. Testifying as an Expert Witness
      3. Module 03: Searching and Seizing Computers
        1. Searching and Seizing Computers without a Warrant
        2. Searching and Seizing Computers with a Warrant
        3. The Electronic Communications Privacy Act
        4. Electronic Surveillance in Communications Networks
        5. Evidence
      4. Module 04: Digital Evidence
        1. Digital Data
        2. Types of Digital Data
        3. Rules of Evidence
        4. Electronic Devices: Types and Collecting Potential Evidence
        5. Digital Evidence Examination Process
        6. Electronic Crime and Digital Evidence Consideration by Crime Categor
      5. Module 05: First Responder Procedures
        1. Electronic Evidence
        2. First Responder
        3. Roles of First Responder
        4. Electronic Devices: Types and Collecting Potential Evidence
        5. First Responder Toolkit
        6. First Response Basics
        7. Securing and Evaluating Electronic Crime Scene
        8. Conducting Preliminary Interviews
        9. Documenting Electronic Crime Scene
        10. Collecting and Preserving Electronic Evidence
        11. Packaging and Transporting Electronic Evidence
        12. Reporting the Crime Scene
        13. Note Taking Checklist
        14. First Responder Common Mistakes
      6. Module 06: Computer Forensics Lab
        1. Setting a Computer Forensics Lab
        2. Investigative Services in Computer Forensics
        3. Computer Forensics Hardware
        4. Computer Forensics Software
      7. Module 07: Understanding Hard Disks and File Systems
        1. Hard Disk Drive Overview
        2. Disk Partitions and Boot Process
        3. Understanding File Systems
        4. RAID Storage System
        5. File System Analysis Using The Sleuth Kit (TSK)
      8. Module 08: Windows Forensics
        1. Collecting Volatile Information
        2. Collecting Non-volatile Information
        3. Windows Memory Analysis
        4. Windows Registry Analysis
        5. Cache, Cookie, and History Analysis
        6. MD5 Calculation
        7. Windows File Analysis
        8. Metadata Investigation
        9. Text Based Logs
        10. Other Audit Events
        11. Forensic Analysis of Event Logs
        12. Windows Password Issues
        13. Forensic Tools
      9. Module 09: Data Acquisition and Duplication
        1. Data Acquisition and Duplication Concepts
        2. Data Acquisition Types
        3. Disk Acquisition Tool Requirements
        4. Validation Methods
        5. RAID Data Acquisition
        6. Acquisition Best Practices
        7. Data Acquisition Software Tools
        8. Data Acquisition Hardware Tools
      10. Module 10: Recovering Deleted Files and Deleted Partitions
        1. Recovering the Deleted Files
        2. File Recovery Tools for Windows
        3. File Recovery Tools for MAC
        4. File Recovery Tools for Linux
        5. Recovering the Deleted Partitions
        6. Partition Recovery Tools
      11. Module 11: Forensics Investigation using AccessData FTK
        1. Overview and Installation of FTK
        2. FTK Case Manager User Interface
        3. FTK Examiner User Interface
        4. Starting with FTK
        5. FTK Interface Tabs
        6. Adding and Processing Static, Live, and Remote Evidence
        7. Using and Managing Filters
        8. Using Index Search and Live Search
        9. Decrypting EFS and other Encrypted Files
        10. Working with Reports
      12. Module 12: Forensics Investigation Using EnCase
        1. Overview of EnCase Forensic
        2. Installing EnCase Forensic
        3. EnCase Interface
        4. Case Management
        5. Working with Evidence
        6. Source Processor
        7. Analyzing and Searching Files
        8. Viewing File Content
        9. Bookmarking Items
        10. Reporting
      13. Module 13: Steganography and Image File Forensics
        1. Steganography
        2. Steganography Techniques
        3. Steganalysis
        4. Image Files
        5. Data Compression
        6. Locating and Recovering Image Files
        7. Image File Forensics Tools
      14. Module 14: Application Password Crackers
        1. Password Cracking Concepts
        2. Types of Password Attacks
        3. Classification of Cracking Software
        4. Systems Software vs. Applications Software
        5. System Software Password Cracking
        6. Application Software Password Cracking
        7. Password Cracking Tools
      15. Module 15: Log Capturing and Event Correlation
        1. Computer Security Logs
        2. Logs and Legal Issues
        3. Log Management
        4. Centralized Logging and Syslogs
        5. Time Synchronization
        6. Event Correlation
        7. Log Capturing and Analysis Tools
      16. Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic
        1. Network Forensics
        2. Network Attacks
        3. Log Injection Attacks
        4. Investigating and Analyzing Logs
        5. Investigating Network Traffic
        6. Traffic Capturing and Analysis Tools
        7. Documenting the Evidence Gathered on a Network
      17. Module 17: Investigating Wireless Attacks
        1. Wireless Technologies
        2. Wireless Attacks
        3. Investigating Wireless Attacks
        4. Features of a Good Wireless Forensics Tool
        5. Wireless Forensics Tools
        6. Traffic Capturing and Analysis Tools
      18. Module 18: Investigating Web Attacks
        1. Introduction to Web Applications and Webservers
        2. Web Logs
        3. Web Attacks
        4. Web Attack Investigation
        5. Web Attack Detection Tools
        6. Tools for Locating IP Address
      19. Module 19: Tracking Emails and Investigating Email Crimes
        1. Email System Basics
        2. Email Crimes
        3. Email Headers
        4. Steps to Investigate
        5. Email Forensics Tools
        6. Laws and Acts against Email Crimes
      20. Module 20: Mobile Forensics
        1. Mobile Phone
        2. Mobile Operating Systems
        3. Mobile Forensics
        4. Mobile Forensic Process
        5. Mobile Forensics Software Tools
        6. Mobile Forensics Hardware Tools
      21. Module 21: Investigative Reports
        1. Computer Forensics Report
        2. Computer Forensics Report Template
        3. Investigative Report Writing
        4. Sample Forensics Report
        5. Report Writing Using Tools
      22. Module 22: Becoming an Expert Witness
        1. Expert Witness
        2. Types of Expert Witnesses
        3. Computer Forensics Experts
        4. Scope of Expert Witness Testimony
        5. Evidence Processing
        6. Rules for Expert Witness
        7. General Ethics While Testifying

Back to Top

This training prepares students for the following exam(s):

  • » 312-49 : Computer Hacking Forensic Investigator (CHFI)

Back to Top

Do you have the right background for EC-Council Computer Hacking Forensic Investigator v8: CHFI?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Emilio G.
- Vastly experienced working within multinational environments and capable of connecting to different audiences - In-depth expertise in the implementation, troubleshooting and documentation of networks and security systems, with strong "hands on" technical knowledge of CISSP, CEH and CHFI. - Master of Science in Electronics Engineering, and holder of several technical certifications. - Highly-skilled in diverse fields ranging from Security, Computer Forensics, Networking, Routing Protocols, Programming, Databases and Applications to name a few. Bio: With over 25 years of technical experience, Emilio brings a dynamic set of skills supported by a Masters Degree in Electronics Engineering and on-the-field experience working in multinational environments. He also holds more than 12 Cisco, CompTIA, and Microsoft certifications. Although he is well versed and thorough in multiple technological fields, his technical forte lies in the security domain, specifically CISSP, CEH and CHFI. Emilio's skills have evolved over time, studying closely and constantly staying well informed of the growing cyber threats. These are just some of the few reasons why Emilio brings to his classes more than just what's in the books.
Larry G.
- More than 14 years of experience as a Security Subject Matter Expert as well as black belt in a variety of martial arts.
- Numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command.
- Much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.

Bio:

Larry is a unique instructor and IT security expert. If you sit in one of his classes you might get the feeling of being in a martial arts class - That's exactly how Larry wants it! "The principles behind IT security are the same as those in a variety of martial arts," Larry says. In addition to teaching IT security for over 14 years, he has practiced martial arts since he was 13 years old and holds black belts in multiple disciplines including Tai Chi, Kung Fu, and Kick Boxing. "All of these techniques are like tools for different types of attacks," Larry explains.

Larry's excellence in certification training and passion for IT security has earned him numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command. He is also a much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.
Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.

Bio:

Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.

See more...   See more instructors...

Back to Top

Client Testimonials & Reviews about their Learning Experience

We are passionate in delivering the best learning experience for our students and they are happy to share their learning experience with us.
Read what students had to say about their experience at NetCom.   Read student testimonials...

Back to Top

Ways to contact us

Back to Top