Certified Hacking Forensic Investigator (CHFI)

A CHFI is a skilled professional trained in the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.

Instructor: Hamza khan
Last updated Mon, 20-Jun-2022
+ View more
Course overview

Course Description

A CHFI is a skilled professional trained in the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. CHFI professionals are aware of legally sound detailed methodological approach to computer forensics and evidence analysis.

Computer Hacking Forensic Investigation (CHFI) is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program.

Certificate

On successful completion of the course participants will be awarded participation certificate from DigiPAKISTAN. Also prepare for International Exam.

Duration & Frequency

Total Duration of the course is 3 months            

What will i learn?

Requirements
Curriculum for this course
Course Introduction
  • Course Introduction
Computer Forensics in Today's World
  • Part 01
  • Part 02
Computer Forensics Investigation Process
  • Pre Investigation
  • Pre Investigation Part 2
  • First Response - Search & Seizure
  • Collect & Secure the Evidence, Data Acquisition
  • Data Analysis, Evidence Assessment, Documentation & Reporting and Expert Witness
Understanding Hard Disks and File Systems
  • Understanding HDD, SSD & It's sizing Criteria
  • Understanding Disk Partitions, Partition Table & Boot Process of Windows,Linux & Mac
  • Undersatding Windows,Linux & Mac Operating System's Filesystems
  • Filesystem Analysis Practical Labs using various techniques
Data Acquisition and Duplication.
  • Data Acquisition and Duplication
  • Creating Image, Integrity Verification, Sector by Sector Disk Analysis & Disk Image Analysis
Defeating Anti-forensics Techniques
  • Defeating Anti-forensics Techniques
Operating System Forensics
  • Introduction to OS Forensics
  • Volatile Information Collection
  • Non-Volatile Information Collection
  • Windows Memory Analysis
  • Registry, Cache, Cookies, Histrory Files and Event Log Analysis and Metadata Investigation
  • Practical Lab Exercises
  • How to Collect Volatile and Non-Volatile Data on Linux & MAC
Network Forensics
  • Part 1
  • Part 2
Investigation Web Attacks
  • Microsoft IIS and Linux Apache Web Servers Attacks Investigations
Database Forensics
  • Microsoft SQL Server & MySQL Forensics
  • Database Forensics - Practical Lab Tasks
Cloud Forensics
  • Part 1
  • Part 2
Malware Forensics
  • Part 1
  • Part 2
Investigating Email Crimes
  • Investigating Email Crimes
Mobile Forensics
  • Mobile Forensics
Forensics Report Writing and Presentation
  • Forensics Report Writing and Presentation
+ View more
Other related courses
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
Updated Thu, 09-Jun-2022
About instructor

Hamza khan

Show full biography
Includes:
  • Verified Certificate
  • Internship Opportunity
  • Career Development