Computer Hacking Forensic Investigator (CHFIv9)



Disclaimer: Tech-Act is an independent training services provider. Any use of third party trademarks, brand names, products and services is only referential.Tech-Act disclaims any sponsorship, affiliation or endorsement of or by any third parties. Tech-Act is an authorized training partner only where explicitly stated and as listed here.



REQUEST INFORMATION


Computer Hacking Forensic Investigator (CHFIv9)


About This Course

Coursework and training covered in EC Council’s CHFI certification aims to prepare individuals to spearhead incident response and cyber investigations using path-breaking forensic technologies. CHFI training bestows individuals with plethora of benefits.


Who Should Attend This Course

CHFI training program is best suited for science/technology and IT professionals.

The course is a perfect-pick-me-up for:

  • Anyone who aspires to be a certified Computer Hacking Forensic Investigator.
  • System administrators
  • Professionals working at federal agencies
  • Law enforcement personnel
  • Government personnel
  • Bankers and insurance professionals
  • IT experts
  • Legal experts
  • Budding ethical hackers

Why This Course

Businesses all across the globe are enduring from the menace of cyber-attacks spearheaded by hackers! Thus, organizations are turning to recruit cyber hacking experts as their arsenal to deal with this menace. This brings into picture computer hacking forensic investigators, who are trained to analyze and investigate cyber hacking crimes. CHFI expert would apply a range of different strategies to collect legal evidence, recover deleted stuff, set up encryption, etc.

CHFI experts tend to earn around a whopping $96,000/ annum. (Source: .itcareerfinder and payscale)


Course Objectives

CHFI certified experts can:

  • Perform forensics and incident response
  • Crack open password protected data
  • Identify images, data or any other malicious activity
  • Skillfully investigate email crimes and cyberattacks
  • Investigate computer break-ins
  • Assess web page hacks
  • Recover deleted data
  • Conduct preliminary interviews
  • Document cybercrime scene

Prerequisites
  • Good knowledge of TCP/IP
  • Minimum one year experience with managing Linux, Unix and Windows systems
  • Good understanding of ethical hacking

Course Benefits


Computer hacking forensic investigators are in great demand by corporate, government, law enforcement, enterprise IT, BFSI (Banking, Financial Services and Insurance) sectors and needless to say, cybersecurity firms across the world. Most of these entities resort to EC-Council certified CHFI certification program. Cyber forensics is witnessing a sea change, since new tools and technologies are invented each day for conducting cyber investigations, be it digital forensics, cybercrime or data recovery.

  • One of the notable benefits of CHFI training is that it teaches individuals about best practices for digital evidence examination, assessment of cybercrimes and diverse evidence rules.
  • Training also teaches about steganography, which is a process to conceal video, image, file or message.
  • The training will help individuals understand the roles of preliminary responders, securing cybercrime scene, documenting cybercrime scene, executing preliminary interviews, upholding electronic evidence and transporting the same.
  • Individuals will also learn to recover deleted data as well as deleted partitions in all the popular operating systems (OS).
  • The training will also enlighten individuals about password cracking concepts, investigation for password protected breaches and attacks.
  • Learn various types of log capturing concepts and tools.
  • Learn to investigate web attacks, wireless attacks, network traffic, etc.
  • Learn about email crimes and investigation.

Curriculum


Computer Forensics in Today’s World

Overview

This section gives a general overview of CHFI version 9 series. It covers topics like who is the intended audience, what the scope, and what are topics that will be addressed.

Computer Forensics in Todays World

This section covers the state of computer forensics in today’s world. It gives foundational knowledge and vocabulary necessary for the CHFI exam. It covers the topics like Defining computer forensics, objectives of computer forensics, Types of cyber crime, rules of forensic investigation, and methodology of forensic investigation.

Computer Forensics Investigation Process

The Investigation Process

This section describes the state of computer forensics in today’s world. It gives foundational knowledge and vocabulary necessary for the CHFI exam. It covers the topics like Defining computer forensics, objectives of computer forensics, Types of cyber crime, rules of forensic investigation, and methodology of forensic investigation.

Investigative Tools Demonstration

This section covers investigation tools commonly used by a CHFI. It explains the tools such as Hash Calculator, Paraben Commander, and EaseUS Data Recovery.

Understanding Hard Disks and File Systems

Hard Disks and File Systems

This section walks through the pertinent information with regards to hard disks and file systems for the CHFI exam. It covers topics like Drive types, hard drive physical components, logical structure, common file systems, interface connectors, density, and disk space.

Forensic File System Tools Demonstration

This section demonstrate a few forensic tools commonly used in the gathering of digital evidence from hard drives and file systems. It covers the tools like The Sleuth Kit(TSK) binaries such as fsstat, istat, and fls. It also explains Autopsy and more of the WinHex utility.

Data Acquisition and Duplication

Data Acquisition and Duplication

This section walks through the common methodologies and tools used in retrieving data and duplicating that data for the purposes of investigation. It covers topics like data acquisition, volatile vs non-volatile data, data collection methodology, and the order of volatility.

Data Acquisition Tools Demonstration

This section walks through using some common forensic tools for gathering digital evidence from a digital storage device. It demonstrate tools like AccessData FTK Imager and Disk Explorer for NTFS to create disk images and view that data in a forensically sound way.

Defeating Anti-Forensics Techniques

Defeating Anti-Forensic Techniques

This section explores some of the methods that bad actors use to avoid detection and hinder forensic investigation. It covers topics like Anti-Forensic its goals and techniques, deleted file recovery in Windows, Linux, and Mac OS, as well as deleted partition recovery.

Anti-Forensics Tools Demonstration

This section demonstrate a few tools that can be used to crack passwords and perform steganography/steganalysis. It covers tools sucha as Advanced PDF Cracker(APDFPR), StegSpy Steg-Detector, and OpenStego.

Operating System Forensics

Operating System Forensics

This section explores digital forensics with regards to the Operating Systems of computer systems. It explains forensic methodologies used to gather information for investigative purposes in a forensically sound manner. It covers MS Windows forensic methodology, volatile information gathering, gathering process info, print spool files, info gathering from clipboard/doskey/shares, and non-volatile info gathering.

Network Forensics

Network Forensics

This section explores network forensics from a CHFI perspective. It covers foundational networking concepts, key areas of networking, Network Forensics, common network attacks, and attacks specific to wireless networks.

Investigating Web Attacks

Investigating Web Attacks

This section takes a look at the many different types of web based attacks, methodology of investigating, challenges facing web forensics, OWASP top 10 vulnerabilities, buffer overflows, cookie poisoning, insecure storage, and information leakage.

Database Forensics

Database Forensics

This section explores databases for the CHFI exam. It covers topics like familiarization with Microsoft’s MySQL databases, file types, log files, collection of active transaction log files, collecting trace files, collecting error logs, methodology for database forensics, InnoDB, etc.

Cloud Forensics

Cloud Forensics

This section covers the cloud technology required as CHFIs. It covers topics like defining characteristics of the cloud, cloud service models (IaaS/PaaS/SaaS), cloud deployment models (Public/Private/Hybrid/Community), cloud specific attacks and categories of cloud crime.

Malware Forensics

Malware Forensics

This section dive into the fascinating world of Malware forensics. It explains each type of malware that can encounter as a CHFI. It covers Backdoors, Rootkits, Botnets, Scareware, Downloaders, Spam-sending malware, Launchers, Worms or virus, and Credential-stealing programs

Investigating Email Crimes

Investigating Email Crimes

This section discusses how E-Mail can play an important role when it comes to investigating email crimes. It explains the client/server architecture and covers the differences between common methods such as SMTP, POP3, and IMAP4.

Mobile Forensics

Mobile Forensics

This section covers mobile forensics. It explains different areas where information can me stored such as internal storage, SIM cards or other external card types. It shows mobile device forencsics process. It also explains not only on the client side but that the service provider may retain useful information as well.

Investigative Reports

Forensics Report Writing and Presentation

This section explores how to report forensic information. It demonstrates an example of an Forensics Report. It also explains how to qualify to become an expert witness. It also covers The Daubert Standard as well as the order as a trial.

Schedule & Fees


SELF PACED Online INSTRUCTOR LED CLASSROOM
Duration 1 Year Access 5 Days 5 Days
Course Material
Exam Voucher
Face Time With Instructor
Course Price $499 On Request On Request
Enroll Now Enquire Now Enquire Now

Course FAQ


Why should I get my CHFI certification from Tech-Act?

Being in the IT domain since the last two decades, we are well versed with the menace of cybersecurity and cyberattacks. We at Tech-Act make sure that we get the best-in-class trainers onboard for our cyber forensic certification programs. Adding to that, we are authorized training partners for EC Council, Red Hat, Project Management Institute, CompTIA and various other leading technology organizations. We also are a Person Vue Authorized Test Center and offer both classroom as well as online training facilities.

Will I be trained by certified trainers?

Yes, be assured, as all our trainers are well-certified and qualified with years of experience.

What are the key benefits of CHFI certification?

Businesses all across the globe are enduring from the menace of cyber-attacks spearheaded by hackers! Thus, organizations are turning to recruit cyber hacking experts as their arsenal to deal with this menace. This brings into picture computer hacking forensic investigators, who are trained to analyze and investigate cyber hacking crimes. CHFI expert would apply a range of different strategies to collect legal evidence, recover deleted stuff, set up encryption, etc.

What’s the eligibility criteria to enroll?

Good knowledge of TCP/IP. Minimum one-year experience with managing Linux, UNIX and Windows systems. Good understanding of ethical hacking.

Testimonials



0

Your Cart