About Course

EC-Council’s CIHFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. This includes establishing the forensics process, lab and evidence handling procedures, as well as the investigation procedures required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.

What is CHFI?

EC-Council’s Certified Hacking Forensic Investi- gator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investi- gations using ground-breaking digital forensics technologies.

Course Content

The program presents a repeatable forensics investigation methodology required from a versatile digital forensic professional, which increases employability. The courseware is power-packed with forensics investigation templates for evidence collection, the chain of custody, final investigation reports, etc. The program comes with cloud-based virtual labs, loaded on advanced Cyber Ranges, enabling students to practice various investigation techniques in real-time and as-close-to-re- al-world-as-can-be simulated environments.

Who is It For?

Forensic Analysts
• Cybercrime Investigators
• Cyber Defense Forensic Analysts
• Incident Responders
• Information Technology Auditors
• Malware Analysts
• Security Consultants
• Chief Security officer
• Police and other law enforcement personnel
• Defense and Security personnel
• e-Business Security professionals
• Legal professionals
• Banking, Insurance, and other professionals
• Government agencies
• IT managers
• Digital Forensics Service Providers

Training Details:

iLearn (Self-Study)

This solution is an asynchronous, self-study environment in a video streaming format.

Training Partner (In Person)

This solution offers “in-person” training so that you can benefit from collaborating with your peers and gaining real-world led by expert, certified instructors.

Week (Live Online)

This solution is a live, online, instructor-led training format.

Exam Details

  • Exam Title: Computer Hacking Forensic Investigator
  • Exam Code: 312-49
  • Number of Questions: 150
  • Duration: 4 hours
  • Availability: ECC EXAM Portal

Who Can Apply?

Recommended Prerequisites for the C|HFI: IT/Forensics professionals with basic knowledge of IT/cybersecurity, computer forensics, incident response, and threat vectors.

Salaries

As per the Salary Survey 75 Report, EC-Council’s C|HFI is the only Digital Forensics certification with a six-digit salary of up to $117,950.

Show More

What Will You Learn?

  • Various phases involved in the computer forensics investigation process
  • Tor browser working methodology and steps involved in the Tor browser forensics process
  • Data acquisition fundamentals and methodology, eDiscovery, and how to prepare image files for forensics examination
  • Various anti-forensics techniques used by attackers, different ways to detect them and related tools, and countermeasures
  • Volatile and non-volatile data acquisition and memory forensics in Linux and Mac operating systems
  • Malware forensics concepts, static and dynamic malware analysis, system and network behavior analysis, and ransomware analysis
  • Components in email communication, steps involved in email crime investigation, and social media forensics
  • Different types of IoT threats, security problems, vulnerabilities and attack surfaces areas, and IoT forensics processes and challenges
  • Computer forensics fundamentals, different types of cybercrimes and their investigation procedures, and regulations and standards that influence computer forensics investigation
  • Cloud computing concepts, cloud forensics and challenges, fundamentals of AWS, Microsoft Azure, and Google Cloud and their investigation processes
  • Different types of disk drives and their characteristics, booting process and file systems in Windows, Linux, and Mac operating systems, file system examination tools, RAID and NAS/SAN storage systems, various encoding standards, and file format analysis
  • Volatile and non-volatile data acquisition in Windows-based operating systems, Windows memory and registry analysis, electron application analysis, web browser forensics, and examination of Windows files, ShellBags, LNK files, jump lists, and Windows event logs
  • Network forensics fundamentals, event correlation concepts, Indicators of Compromise (IOCs) and ways to identify them from network logs, techniques and tools related to network traffic investigation, incident detection and examination, and wireless attack detection and investigation
  • Web application forensics and challenges, web application threats and attacks, web application logs (IIS logs, Apache web server logs, etc.), and how to detect and investigate various web application attacks
  • Architectural layers and boot processes of Android and iOS devices, mobile forensics process, various cellular networks, SIM file system, and logical and physical acquisition of Android and iOS devices

Course Content

Module 01: Computer Forensics In Today’s World

  • Understand the Fundamentals of Computer Forensics
  • Understand Cybercrimes and their Investigation Procedures
  • Understand Digital Evidence
  • Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics
  • Identify the Roles and Responsibilities of a Forensic Investigator
  • Understand the Challenges Faced in Investigating Cybercrimes
  • Understand Legal Compliance in Computer Forensics

Module 02: Computer Forensics Investigation Process

Module 03: Understanding Hard Disks And File Systems

Module 04: Data Acquisition And Duplication

Module 05: Defeating Anti-Forensics Techniques

Module 06: Windows Forensics

Module 07: Linux And Mac Forensics

Module 08: Network Forensics

Module 09: Investigating Web Attacks

Module 10: Dark Web Forensics

Module 11: Database Forensics

Module 12: Cloud Forensics

Module 13: Investigating Email Crimes

Module 14: Malware Forensics

Module 15: Mobile Forensics

Module 16: IoT Forensics

Student Ratings & Reviews

5.0
Total 3 Ratings
5
3 Ratings
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
7 months ago
Informative, engaging, practical. The course delivers essential insights for those aiming to enhance their online marketing capabilities.
7 months ago
Engaging, practical, essential. The course equips learners to excel in online marketing strategies effectively and efficiently
7 months ago
Dynamic, practical, transformative. The course empowers learners to master effective online marketing strategies with confidence and clarity.