Computer Hacking Forensic Investigator

Securing Network with Forensic Science

Duration : 5 Days (35hrs) / 9.30am-5.30pm

Course Summary

The Computer Hacking Forensic Investigator (CHFI) is a Digital Forensic course in Cyber Security. Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cyber security profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors ares.

Cyber security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams. The Computer Hacking Forensic Investigator (CHFI) Computer Forensic course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. The Computer Hacking Forensic Investigator (CHFI) provides its attendees with a firm grasp on the domains of digital forensics.

This course prepares you for EC-Council Computer Hacking Forensic Investigator (CHFI) exam 312-49.

What you will learn

CHFI v9 curriculum is a comprehensive course with 14 training modules covering major forensic investigation scenarios :

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Operating System Forensics
  • Defeating Anti-Forensics Techniques
  • Data Acquisition and Duplication
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating E-mail Crimes
  • Mobile Forensics
  • Investigative Reports

Why take CHFI Course at iENABLER

CHFI provides necessary skills to perform effective digital forensic investigation.

It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout computer forensic investigation leading to prosecution of perpetrators.

CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

Our instructor will also prepare you for the CHFI exam (Exam code : 312-49).

Course Information

Course Objective

Computer Hacking Forensic Investigator CHFI v9

  • How to set up a computer forensic lab
  • Password Cracking
  • How to recover deleted files
  • How to write investigative reports
  • Roles of first responder, securing and evaluating an electronic crime scene, conducting preliminary interviews, documenting electronic crime scene and collecting and preserving electronic evidence

Download Course Brochure

Course Fees

Course Fee : $2800
Regn Fee : $50

Course fee includes 1 CHFI Exam.

All fees subject to prevailing GST. (Contact Customer Service @ 6333 4843)

Course Prerequisite

  • IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics and incident response
  • Prior completion of CEH training would be an advantage

  • Course Outline

    1.0 Computer Forensics in Today’s World

  • Understanding Computer Forensics
  • Why and When Do You Use Computer Forensics?
  • Cyber Crime (Types of Computer Crimes)
  • Case Study
  • Challenges Cyber Crimes Present For Investigators
  • Cyber Crime Investigation
  • Rules of Forensics Investigation
  • Understanding Digital Evidence
  • Types of Digital Evidence
  • Characteristics of Digital Evidence
  • Role of Digital Evidence
  • Sources of Potential Evidence
  • Rules of Evidence
  • Forensics Readiness
  • Computer Forensics as part of an Incident Response Plan
  • Need for Forensic Investigator
  • Roles and Responsibilities of Forensics Investigator
  • What makes a Good Computer Forensics Investigator?
  • Investigative Challenges
  • Legal and Privacy Issues
  • Code of Ethics
  • Accessing Computer Forensics Resources

  • Download Course brochure

    2.0 Computer Forensics Investigation Process

  • Importance of Computer Forensics Process
  • Phases Involved in the Computer Forensics Investigation Process
  • Pre-investigation Phase
  • Investigation Phase
  • Post-investigation Phase
  • 3.0 Understanding Hard Disks and File Systems

  • Hard Disk Drive Overview
  • Disk Partitions and Boot Process
  • Understanding File Systems
  • RAID Storage System
  • File System Analysis
  • 4.0 Data Acquisition and Duplication

  • Data Acquisition and Duplication Concepts
  • Static Acquisition
  • Validate Data Acquisitions
  • Acquisition Best Practices
  • 5.0 Defeating Anti-forensics Techniques

  • What is Anti-Forensics?
  • Anti-Forensics techniques
  • 6.0 Operating System Forensics (Windows, Mac, Linux)

  • Windows Forensics
  • Linux Forensics
  • MAC Forensics
  • 7.0 Network Forensics

  • Introduction to Network Forensics
  • Fundamental Logging Concepts
  • Event Correlation Concepts
  • Network Forensic Readiness
  • Network Forensics Steps
  • Network Traffic Investigation
  • Documenting the Evidence
  • Evidence Reconstruction
  • 8.0 Investigating Web Attacks

  • Introduction to Web Application Forensics
  • Web Attack Investigation
  • Investigating Web Server Logs
  • Web Attack Detection Tools
  • Tools for Locating IP Address
  • WHOIS Lookup Tools
  • 9.0 Database Forensics

  • Database Forensics and Its Importance
  • MSSQL Forensics
  • MySQL Forensics
  • 10.0 Cloud Forensics

  • Introduction to Cloud Computing
  • Cloud Forensics
  • 11.0 Malware Forensics

  • Introduction to Malware
  • Introduction to Malware Forensics
  • 12.0 Investigating Email Crimes

  • Email System
  • Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
  • Email Message
  • Steps to Investigate Email Crimes and Violation
  • Email Forensics Tools
  • Laws and Acts against Email Crimes
  • 13.0 Mobile Phone Forensics

  • Mobile Device Forensics
  • 14.0 Forensics Report Writing and Presentation

  • Writing Investigation Reports
  • Expert Witness Testimony

  • Course Schedule

    Course Title   Venue Register Online
    Course Mode
    Start Date
    End Date
    Computer Hacking Forensic Investigator CHFI  

    IT Enabler Consultancy Pte Ltd

    Address: 12 Arumugam Road
    #04-02 LTC Building B
    Singapore 409958

    +65 6333 4843

    Join Our Mailing Lists

    Stay In Touch