CODEC Networks Course Hacking Forensic Investigator/CHFI image

Certified Hacking Forensic Investigator

Course Description

Computer forensics training teaches that computer forensic investigation is the process of hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer Hacking Forensic investigators (CHFI) can draw on an array of methods for discovering data that resides in a computer system or be recovering deleted, encrypted, or damaged file information. Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases.

CHFIv8 presents the detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

Who Should Attend

CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective.

The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Modules Covered

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Searching and Seizing of Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigations Using Access Data FTK
  • Forensics Investigations Using Encase
  • Steganography & Image File Forensics
  • Application Password Crackers
  • Log Capturing & Event Correlation
  • Network Forensics and Investigating Logs and Investigating Network Traffic
  • Investigation Web Attacks
  • Tracking Emails and Investigating Email Crimes
  • Mobile Forensics
  • Investigative Report
  • Becoming an Expert Witness

Post Training Program (CODEC Networks Specialty)

  • Extensive Exam Preparation Classroom Training (4 Classes)
  • Hand-over Labs & Practical’s Checklist for review

Course Duration

  • Regular Track : 8 Weeks (3 Hours/Day)
  • Weekend Track : 14 Weekends (4 Hours/Day)

Certification Exam Info

  • Number of Question : 150 Nos.
  • Test Format : Multiple Choice
  • Test Delivery : Prime Prometric (IBT)

Kit Include

  • EC-Council Authorized Training Material
  • EC-Council Authorized DVD Toolkits
  • Discount Vouchers up to 15 - 25% for further training
  • CHFIv8 Certification from EC-Council (After clearing the exam)