top of page

EC-Council Computer Hacking Forensic Investigator (CHFI)

Course Price

Request a Quote

Course length

5 days (40 hours)

EC-Council Computer Hacking Forensic Investigator (CHFI)

Portfolio

EC-Council

ADVANCED CERTIFICATION
Validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.

Essential Assets Group is an EC-Council Accredited Training Center (ATC) and Examination Testing Center (ETC) approved to deliver EC-Council CHFI.

EC-Council CHFI is developed to the highest standards and has achieved ANSI 17024 accreditation and is approved by the US DoD to meet directive 8140/8570.01-M requirements. CHFI meets CSSP Infrastructure Support and CSSP Incident Responder requirements.

About the Course

The CHFIv9 computer forensics program is designed for all IT professionals involved with information system security, computer forensics, and incident response. EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. Our digital forensics certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

The exam validates the necessary skills to perform effective digital forensic investigation.

The program prepares candidates for the CHFI Certification Exam (312-49). It is designed for IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response. Prior completion of CEH training is recommended.

Topics Covered

    Computer Forensics in Today’s World
    Computer Forensics Investigation Process
    Understanding Hard Disks and File Systems
    Operating System Forensics
    Defeating Anti-Forensics Techniques
    Data Acquisition and Duplication
    Network Forensics
    Investigating Web Attacks
    Database Forensics
    Cloud Forensics
    Malware Forensics
    Investigating E-mail Crimes
    Mobile Forensics
    Investigative Reports

Course Brochure

bottom of page