print
Course Name
Computer Hacking Forensic Investigator (CHFI)

Contact Hours: 40

Course Description
CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Cybersecurity professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams. The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. CHFI provides its attendees a firm grasp on the domains of digital forensics.

Please note: Course of study may be completed earlier than indicated and students retain access for one year from date of enrollment.


Outcome
CHFI certification is for IT professionals looking to gain the following security analyst skills:
  • Perform incident response and forensics
  • Perform electronic evidence collections
  • Perform digital forensic acquisitions
  • Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.
  • Examine and analyze text, graphics, multimedia, and digital images
  • Conduct thorough examinations of computer hard disk drives, and other electronic data storage media
  • Recover information and electronic data from computer hard drives and other data storage devices
  • Follow strict data and evidence handling procedures
  • Maintain audit trail (i.e., chain of custody) and evidence integrity
  • Work on technical examination, analysis and reporting of computer-based evidence and much more!



Assessment
Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

Required Book(s)
All training is delivered online; no additional purchase required.

Outline
Module 1: Computer Forensics Introduction

        1.0 Intro to Course Pt. 1
        1.1 Intro to Course Pt. 2
        1.2 Intro to Course Pt. 3
        1.3 Intro to Course Pt. 4
        1.4 Intro to Course Pt. 5
        1.5 Intro to Forensics Pt. 1
        1.6 Intro to Forensics Pt. 2
        1.7 Intro to Forensics Pt. 3
        1.8 Intro to Forensics Pt. 4
        1.9 Intro to Forensics Pt. 5
        1.10 Intro to Forensics Pt. 6
        1.11 Intro to Forensics Pt. 7
        1.12 Intro to Forensics Pt. 8

Module 2: Forensics Investigation Process

        2.0 Forensics Investigation Process Pt. 1
        2.1 Forensics Investigation Process Pt. 2
        2.2 Forensics Investigation Process Pt. 3
        2.3 Forensics Investigation Process Pt. 4
        2.4 Forensics Investigation Process Pt. 5
        2.5 Forensics Investigation Process Pt. 6
        2.6 Forensics Investigation Process Pt. 7
        2.7 Forensics Investigation Process Pt. 8
        2.8 Forensics Investigation Process Pt. 9
        2.9 Forensics Investigation Process Pt. 10

Module 3: Searching and Seizing

        3.0 Searching and Seizing Pt. 1
        3.1 Searching and Seizing Pt. 2
        3.2 Searching and Seizing Pt. 3
        3.3 Searching and Seizing Pt. 4
        3.4 Searching and Seizing Pt. 5

Module 4: Digital Evidence

4.0 Digital Evidence Pt. 1
        4.1 Digital Evidence Pt. 2
        4.2 Digital Evidence Pt. 3
        4.3 Digital Evidence Pt. 4
        4.4 Digital Evidence Pt. 5
        4.5 Digital Evidence Pt. 6
        4.6 Digital Evidence Pt. 7

Module 5: First Responder Procedures

        5.0 First Responder Procedures Pt. 1
        5.1 First Responder Procedures Pt. 2
        5.2 First Responder Procedures Pt. 3
        5.3 First Responder Procedures Pt. 4
        5.4 First Responder Procedures Pt. 5
        5.5 First Responder Procedures Pt. 6
        5.6 First Responder Procedures Pt. 7
        5.7 First Responder Procedures Pt. 8

Module 6: Forensics Lab

        6.0 Forensic Lab Pt. 1
        6.1 Forensic Lab Pt. 2
        6.2 Forensic Lab Pt. 3
        6.3 Forensic Lab Pt. 4
        6.4 Forensic Lab Pt. 5

Module 7: Hard Disks and File Systems

        7.0 Hard Disks and File Systems Pt. 1
        7.1 Hard Disks andFile Systems Pt. 2
        7.2 Hard Disks and File Systems Pt. 3
        7.3 Hard Disks and File Systems Pt. 4
        7.4 Hard Disks and File Systems Pt. 5
        7.5 Hard Disks and File Systems Pt. 6
        7.6 Hard Disks and File Systems Pt. 7
        7.7 Hard Disks and File Systems Pt. 8
        7.8 Hard Disks and File Systems Pt. 9
        7.9 Hard Disks and File Systems Pt. 10

Module 8: Windows Forensics

        8.0 Windows Forensics Pt. 1
        8.1 Windows Forensics Pt. 2
        8.2 Windows Forensics Pt. 3
        8.3 Windows Forensics Pt. 4
        8.4 Windows Forensics Pt. 5
        8.5 Windows Forensics Pt. 6
        8.6 Windows Forensics Pt. 7
        8.7 Windows Forensics Pt. 8
        8.8 Windows Forensics Pt. 9
        8.9 Windows Forensics Pt. 10

Module 9: Data Acquisition and Duplication

        9.0 Data Acquisition and Duplication Pt. 1
        9.1 Data Acquisition and Duplication Pt. 2
        9.2 Data Acquisition and Duplication Pt. 3
        9.3 Data Acquisition and Duplication Pt. 4
        9.4 Data Acquisition and Duplication Pt. 5
        9.5 Data Acquisition and Duplication Pt. 6
        9.6 Data Acquisition and Duplication Pt. 7

Module 10: Recovering Deleted Files and Partitions
       
        10.0 Recovering Deleted Files and Partitions Pt. 1
        10.1 Recovering Deleted Files and Partitions Pt. 2

Module 11: Using Access Data FTK

        11.0 Using Access Data FTK and Special Steps Pt. 1
        11.1 Using Access Data FTK and Special Steps Pt. 2
        11.2 Using Access Data FTK and Special Steps Pt. 3
        11.3 Using Access Data FTK and Special Steps Pt. 4
        11.4 Using Access Data FTK and Special Steps Pt. 5
        11.5 Using Access Data FTK and Special Steps Pt. 6
        11.6 Using Access Data FTK and Special Steps Pt. 7
        11.7 Using Access Data FTK and Special Steps Pt. 8

Module 12: Using EnCase

        12.0 EnCase Pt. 1
        12.1 EnCase Pt. 2
        12.2 EnCase Pt. 3

Module 13: Steganography

        13.0 Stenography Pt. 1
        13.1 Stenography Pt. 2
        13.2 Stenography Pt. 3
        13.3 Stenography Pt. 4

Module 14: Password Crackers

        14.0 Passwords Pt. 1
        14.1 Passwords Pt. 2
        14.2 Passwords Pt. 3
        14.3 Passwords Pt. 4

Module 15: Log Correlation

        15.0 Log Correlation Pt. 1
        15.1 Log Correlation Pt. 2
        15.2 Log Correlation Pt. 3
        15.3 Log Correlation Pt. 4
        15.4 Log Correlation Pt. 5
        15.5 Log Correlation Pt. 6

Module 16: Network Forensics

        16.0 Network Forensics Pt. 1
        16.1 Network Forensics Pt. 2
        16.2 Network Forensics Pt. 3
        16.3 Network Forensics Pt. 4

Module 17: Wireless Attacks

        17.0 Wireless Attacks Pt. 1
        17.1 Wireless Attacks Pt. 2
        17.2 Wireless Attacks Pt. 3

Module 18: Web Attacks

        18.0 Web Attacks Pt. 1
        18.1 Web Attacks Pt. 2
        18.2 Web Attacks Pt. 3
        18.3 Web Attacks Pt. 4
        18.4 Web Attacks Pt. 5
        18.5 Web Attacks Pt. 6
        18.6 Web Attacks Pt. 7
        18.7 Web Attacks Pt. 8

Module 19: Email Crimes

        19.0 Email Crimes Pt. 1
        19.1 Email Crimes Pt. 2
        19.2 Email Crimes Pt. 3
        19.3 Email Crimes Pt. 4

Module 20: Mobile Investigation

        20.0 Mobile Investigation Pt. 1
        20.1 Mobile Investigation Pt. 2
        20.2 Mobile Investigation Pt. 3
        20.3 Mobile Investigation Pt. 4
        20.4 Mobile Investigation Pt. 5

Module 21: Investigative Reports

        21.0 Investigation Reports Pt. 1
        21.1 Investigation Reports Pt. 2
        21.2 Investigation Reports Pt. 3
        21.3 Investigation Reports Pt. 4

Module 22: Expert Witness

        22.0 Expert Witness Pt. 1
        22.1 Expert Witness Pt. 2
        22.2 Expert Witness Pt. 3