EC-Council Computer Hacking Forensics Investigator (CHFI)

4.6 out of 5 rating Last updated 21/11/2024   English

Jump to outline

Global Schedule

GTR = Guaranteed to Run

16 Dec 24 Book
14:00 - 22:00 Live Online 3,177
10 Mar 25 Book
13:00 - 21:00 Live Online 3,177

09 Jun 25 Book
14:00 - 22:00 Live Online 3,177
Duration

5 Days

30 CPD hours

Description

EC-CouncilÂ’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.

This intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the worldÂ’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.

Prerequisites

IT/forensics professionals with basic knowledge of IT/cybersecurity, computer forensics, incident response, and threat vectors.

Computer Forensics in Today’s World

  • Understand the Fundamentals of Computer Forensics
  • Understand Cybercrimes and their Investigation Procedures
  • Understand Digital Evidence and eDiscovery
  • Understand Forensic Readiness
  • Understand the Role of Various Processes and Technologies in Computer Forensics
  • Identify the Roles and Responsibilities of a Forensic Investigator
  • Understand the Challenges Faced in Investigating Cybercrimes
  • Understand Various Standards and Best Practices Related to Computer Forensics
  • Understand Laws and Legal Compliance in Computer Forensics

Computer Forensics Investigation Process

  • Understand the Forensic Investigation Process and its Importance
  • Understand First Response
  • Understand the Pre-investigation Phase
  • Understand the Investigation Phase
  • Understand the Post-investigation Phase

Understanding Hard Disks and File Systems

  • Describe Different Types of Disk Drives and their Characteristics
  • Explain the Logical Structure of a Disk
  • Understand the Booting Process of Windows, Linux, and macOS Operating Systems
  • Understand Various File Systems of Windows, Linux and macOS Operating Systems
  • Understand File System Analysis
  • Understand Storage Systems
  • Understand Encoding Standards and Hex Editors
  • Analyze Popular File Formats Using Hex Editor

Data Acquisition and Duplication

  • Understand Data Acquisition Fundamentals
  • Understand eDiscovery
  • Understand Data Acquisition Methodology
  • Prepare an Image File for Examination

Defeating Anti-forensics Techniques

  • Understand Anti-forensics Techniques
  • Discuss Data Deletion and Recycle Bin Forensics
  • Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
  • Explore Password Cracking/Bypassing Techniques
  • Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
  • Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
  • Detect Program Packers and Footprint Minimizing Techniques

Windows Forensics

  • Understand Windows Forensics
  • Collect Volatile Information
  • Collect Non-volatile Information
  • Perform Windows Memory Analysis
  • Perform Windows Registry Analysis
  • Perform Electron Application Analysis
  • Perform Web Browser Forensics
  • Examine Windows Files and Metadata
  • Understand ShellBags, LNK Files, and Jump Lists
  • Understand Text-based Logs and Windows Event Logs

Linux and Mac Forensics

  • Collect Volatile Information in Linux
  • Collect Non-volatile Information in Linux
  • Understand Linux Memory Forensics
  • Understand Mac Forensics
  • Collect Volatile Information in Mac
  • Collect Non-volatile Information in Mac
  • Understand Mac Memory Forensics and Mac Forensics Tools

Network Forensics

  • Understand Network Forensics
  • Summarize Event Correlation Concepts
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  • Perform Incident Detection and Examination Using SIEM Tools
  • Understand Wireless Network Forensics
  • Detect and Investigate Wireless Network Attacks

Malware Forensics

  • Understand Malware Concepts
  • Understand Malware Forensics
  • Perform Static Malware Analysis
  • Analyzing Suspicious Documents
  • Perform System Behavior Analysis
  • Perform Network Behavior Analysis
  • Perform Ransomware Analysis

Investigating Web Attacks

  • Understand Web Application Forensics
  • Understand Internet Information Services (IIS) Logs
  • Understand Apache Web Server Logs
  • Detect and Investigate Various Attacks on Web Applications

Dark Web Forensics

  • Understand the Dark Web and Dark Web Forensics
  • Determine How to Identify the Traces of Tor Browser during Investigation
  • Perform Tor Browser Forensics

Cloud Forensics

  • Understand Cloud Computing Concepts
  • Understand Cloud Forensics
  • Understand Amazon Web Services (AWS) Fundamentals
  • Perform AWS Forensics
  • Understand Microsoft Azure Fundamentals
  • Perform Microsoft Azure Forensics
  • Understand Google Cloud Fundamentals
  • Perform Google Cloud Forensics

Email and Social Media Forensics

  • Understand Email Basics
  • Explain Email Crime Investigation and its Steps
  • Understand U.S. Laws Against Email Crime
  • Explain Social Media Forensics

Mobile Forensics

  • Understand Mobile Device Forensics
  • Understand Android and iOS Architecture, Boot Process, and File Systems
  • Understand Mobile Forensics Process
  • Investigate Cellular Network Data
  • Perform File System Acquisition
  • Understand Phone Locks, Rooting, and Jailbreaking of Mobile Devices
  • Perform Logical Acquisition on Mobile Devices
  • Perform Physical Acquisition on Mobile Devices
  • Perform Android and iOS Forensic Analysis

IoT Forensics

  • Understand IoT Concepts
  • Perform Forensics on IoT Devices
Additional course details:

Nexus Humans, EC-Council Computer Hacking Forensics Investigator (CHFI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.

This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.

Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.

While we feel this is the best course for the ITS Data Analytics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.

Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

FAQ for the EC-Council Computer Hacking Forensics Investigator (CHFI) Course

Available Delivery Options for the EC-Council Computer Hacking Forensics Investigator (CHFI) training.
  • Live Instructor Led Classroom Online (Live Online)
  • Traditional Instructor Led Classroom (TILT/ILT)
  • Delivery at your offices in London or anywhere in the UK
  • Private dedicated course as works for your staff.
What certification does the EC-Council Computer Hacking Forensics Investigator (CHFI) training prepare you for?

The EC-Council Computer Hacking Forensics Investigator (CHFI) training course helps prepare you for the CHFI certification path.

How many CPD hours does the EC-Council Computer Hacking Forensics Investigator (CHFI) training provide?

The 5 day. EC-Council Computer Hacking Forensics Investigator (CHFI) training course give you up to 30 CPD hours/structured learning hours. If you need a letter or certificate in a particular format for your association, organisation or professional body please just ask.

Which exam does the EC-Council Computer Hacking Forensics Investigator (CHFI) training course prepare you for?

The EC-Council Computer Hacking Forensics Investigator (CHFI) prepares you for the CHFI official exam. You can take this exam at any exam center across UK including, England, Scotland, Cymru (Wales) or Northern Ireland or live online where ever you are. Exams vary in duration and if required you can request with the provider for any accommodations appropriate for you.

Is the EC-Council Computer Hacking Forensics Investigator (CHFI) training appropriate for someone learning to use CHFI in a professional environment?

Yes the EC-Council Computer Hacking Forensics Investigator (CHFI) is appropriate for someone looking to use CHFI in a professional workspace or environment. But do make sure to note any prerequisites, read the course outline to ensure it is the right fit for you or your teams requirements and preferences.

Do you provide training for the EC-Council Computer Hacking Forensics Investigator (CHFI).

Yes we provide corporate training, dedicated training and closed classes for the EC-Council Computer Hacking Forensics Investigator (CHFI). This can take place anywhere in UK including, England, Scotland, Cymru (Wales) or Northern Ireland or live online allowing you to have your teams from across UK or further afield to attend a single training event saving travel and delivery expenses.

What is the duration of the EC-Council Computer Hacking Forensics Investigator (CHFI) program.

The EC-Council Computer Hacking Forensics Investigator (CHFI) training takes place over 5 day(s), with each day lasting approximately 8 hours including small and lunch breaks to ensure that the delegates get the most out of the day.

What other terms do people search for when looking for this course?

Popular related searched include CHFI.

Why are Nexus Human the best provider for the EC-Council Computer Hacking Forensics Investigator (CHFI)?
Nexus Human are recognised as one of the best training companies as they and their trainers have won and hold many awards and titles including having previously won the Small Firms Best Trainer award, national training partner of the year for UK on multiple occasions, having trainers in the global top 30 instructor awards in 2012, 2019 and 2021. Nexus Human has also been nominated for the Tech Excellence awards multiple times. Learning Performance institute (LPI) external training provider sponsor 2024.
Is there a discount code for the EC-Council Computer Hacking Forensics Investigator (CHFI) training.

Yes, the discount code PENPAL5 is currently available for the EC-Council Computer Hacking Forensics Investigator (CHFI) training. Other discount codes may also be available but only one discount code or special offer can be used for each booking. This discount code is available for companies and individuals.

Jump to dates

Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Top