Facebook Twitter Blogger You Tube

877.484.1182

Facebook Share on Facebook
5 Days
Computer Hacking Forensic Investigator v8 (CHFI)

 
Join our Mailing list

Certifications:

Course At A Glance

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacke... READ MORE

Request a Quote

 

There are currently no scheduled classes.

Try searching for another option from our course list.

Course Locator

Or call us at (623) 570-4309 to request a class near you!

Computer Hacking Forensic Investigator v8 (CHFI)

Course Length: 5 Days

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client's systems, to tracing the originator of defamatory emails, to recovering signs of fraud.

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?"

Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

The CHFI is a very advanced security-training program. Proper preparation is required before conducting the CHFI class.


Course Objectives

After taking this course, students will have the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute.


Intended Audience

This course is intended for many audiences, including the following:

  • Forensic Investigators
  • System Administrators
  • Programmers
  • Students
  • IT Security Professional

Computer Hacking Forensic Investigator v8 (CHFI)

Lessons

  • Lesson 1: Computer Forensics in Today's World
  • Lesson 2: Computer Forensics Investigation Process
  • Lesson 3: Searching and Seizing of Computers
  • Lesson 4: Digital Evidence
  • Lesson 5: First Responder Procedures
  • Lesson 6: Computer Forensics Lab
  • Lesson 7: Understanding Hard Disks and File Systems
  • Lesson 8: Windows Forensics
  • Lesson 9: Data Acquisition and Duplication
  • Lesson 10: Recovering Deleted Files and Deleted Partitions
  • Lesson 11: Forensics Investigations Using AccessData FTK
  • Lesson 12: Forensics Investigations Using Encase
  • Lesson 13: Steganography and Image Files Forensics
  • Lesson 14: Application Password Crackers
  • Lesson 15: Log Capturing and Event Correlation
  • Lesson 16: Network Forensics, Investigating Logs and Investigating Network Traffic
  • Lesson 17: Investigating Wireless Attacks
  • Lesson 18: Investigating Web Attacks
  • Lesson 19: Tracking Emails and Investigating Email Crimes
  • Lesson 20: Mobile Forensics
  • Lesson 21: Investigative Reports
  • Lesson 22: Becoming an Expert Witness

Computer Hacking Forensics Investigator (CHFI)

Computer Hacking Forensics Investigator (CHFI)

CHFI Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

 

Training and Certification Courses and Bootcamps in VMware | Microsoft Technical | Microsoft Developer | Microsoft Sharepoint | Security | Cisco | Citrix