Computer Hacking Forensic Investigator (CHFI)
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.
Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you.
This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.
The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification.
At course completion students will be able to:
- Perform network and application penetration testing using both automated and manual techniques
- Design and perform audits of computer systems to ensure they are operating securely and that data is protected from both internal and external threats
- Assess assigned system to determine system security status
- Design and recommend security policies and procedures
- Ensure compliance to policies and procedures
- Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and databases
- Lead investigations of security violations and breaches and recommend solutions; prepare reports on intrusions as necessary and provide an analysis summary for management
- Respond to more complex queries and request for computer security information and report from both internal and external customers
PrerequisitesThe CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.
Module 1: Computer Forensics in Today's World
Module 2: Forensics Science
Module 3: Computer Forensics
Module 4: Security Incident Report
Module 5: Aspects of Organizational Security
Module 6: Evolution of Computer Forensics
Module 7: Objective of Computer Forensics
Module 8: Need for Compute Forensics
Module 9: Forensics Readiness
Module 10: Benefits of Forensics Readiness
Module 11: Goals of Forensics Readiness
Module 12: Forensics Readiness Planning
Module 13: Cyber Crime
Module 14: Computer Facilitated Crimes
Module 15: Modes of Attacks
Module 16: Examples of Cyber Crime
Module 17: Types of Computer Crimes
Module 18: Cyber Criminals
Module 19: Organized Cyber Crime: Organizational Chart
Module 20: How Serious are Different Types of Incidents?
Module 21: Disruptive Incidents to the Business
Module 22: Cost Expenditure Responding to the Security Incident
Module 23: Cyber Crime Investigation
Module 24: Key Steps in Forensics Investigation
Module 25: Rules of Forensics Investigation
Module 26: Need for Forensics Investigator
Module 27: Role of Forensics Investigator
Module 28: Accessing Computer Forensics Resources
Module 29: Role of Digital Evidence
Module 30: Corporate Investigations
Module 31: Understanding Corporate Investigations
Module 32: Approach to Forensics Investigation: A Case Study
Module 33: Instructions for the Forensic Investigator to Approach the Crime Scene
Module 34: Why and When Do You Use Computer Forensics?
Module 35: Enterprise Theory of Investigation (ETI)
Module 36: Legal Issues
Module 37: Reporting the Results
Module 38: Reporting a Cyber Crime
Module 39: Why you Should Report Cybercrime?
Module 40: Reporting Computer-Related Crimes
Module 41: Person Assigned to Report the Crime
Module 42: When and How to Report an Incident?
Module 43: Who to Contact at the Law Enforcement?
Module 44: Federal Local Agents Contact
Module 45: More Contacts
Module 46: CIO Cyberthreat Report Form