☰

CHFI - Computer Hacking Forensic Investigator v10 Training

The CHFI: Certified Hacking Forensic Investigator training course is a completely ANSI-accredited and lab-focused program. This CHFI training is vendor-neutral training in digital forensics.

πŸ“˜ EC-Council πŸŽ“ Certification: YES πŸ‘₯ 1674 Enrolled ⏱️ 5 Days πŸ’Ό Intermediate Level ⭐ 4.8 | 113 Reviews

Why Microtek Learning?

500+

Courses

10+ Years

Experience

95K+

Global Learners

Virtual Instructor-Led Training

$2995
πŸ“„ Download PDF
Brand Logo | CHFI - Computer Hacking Forensic Investigator v10

Course Overview

The CHFI: Certified Hacking Forensic Investigator training course is a completely ANSI-accredited and lab-focused program.

This CHFI training is vendor-neutral training in digital forensics. With this training, the participant will understand digital forensics, the detailed and best approach to digital forensics, and evidence analysis that revolves around Dark Web, IoT, and Cloud Forensics.

With the help of techniques and tools, the participant will learn to conduct digital investigations and groundbreaking digital forensics technologies.

This Certified Hacking Forensic Investigator training program is for IT professionals involved with information system security, computer forensics, and incident response.

It helps strengthen the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

The CHFI training provides the essential skills to proactively investigate complicated security threats, allowing them to explore, record, and report cybercrimes to prevent future attacks.

Click here to download CHFI Battle Card

Note: This training is DOD-approved (DEPARTMENT OF DEFENSE)

Mode of Training

🏫 Classroom πŸ’» Live Online πŸ§ͺ Blended πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘¦ Private Group

What you will learn

  • Understanding Hard Disks and File Systems
  • Perform Data Acquisition and Duplication
  • Understand Anti-forensics Techniques
  • Understand Anti-forensics Techniques
  • Perform Windows Forensics
  • Perform Linux and Mac Forensics
  • Perform Network Forensics
  • Investigating Web Attacks
  • Understand the Dark Web
  • Understand Cloud Forensics
  • Investigating Email Crimes
  • Perform Mobile Forensics
  • Perform IoT Forensics
  • Understand Database Forensics and its Importance
  • Understand the Basic Cloud Computing Concepts
  • Understand the Fundamentals of Computer Forensics
  • Understand Cybercrimes and their Investigation Procedures
  • Understand the Forensic Investigation Process and its Importance

Who Should Attend This Course?

  • Defense and Security personnel
  • e-Business Security professionals
  • Police and other law enforcement personnel
  • Banking, Insurance, and other professionals
  • Legal professionals
  • Government agencies
  • IT managers
  • Digital Forensics Service Providers

See what's New in CHFI v10

what's New in CHFI v10

 

Prerequisites

Required

  • IT/forensics professionals with basic knowledge of IT/cyber security, computer forensics, and incident response.

Recommended

  • Prior completion of CEH training would be an advantage

πŸ“ž Talk to a Learning Advisor

Please enter Name
Please enter a valid email address.
Please enter a valid phone number in international format (e.g., +14155552671).
Please enter Message
Please agree to I agree to Terms & Privacy Policy*.
Please agree to I authorize Microtek Learning to contact me via Phone/Email*.

πŸ“˜ CHFI - Computer Hacking Forensic Investigator v10 Outline

  • Understand the Fundamentals of Computer Forensics
  • Understand Cybercrimes and their Investigation Procedures
  • Understand Digital Evidence
  • Understand Forensic Readiness, Incident Response and the Role of SOC (Security
  • Operations Center) in Computer Forensics
  • Identify the Roles and Responsibilities of a Forensic Investigator
  • Understand the Challenges Faced in Investigating Cybercrimes
  • Understand Legal Compliance in Computer Forensics
  • Understand the Forensic Investigation Process and its Importance
  • Understand the Pre-investigation Phase
  • Understand First Response
  • Understand the Investigation Phase
  • Understand the Post-investigation Phase
  • Describe Different Types of Disk Drives and their Characteristics
  • Explain the Logical Structure of a Disk
  • Understand Booting Process of Windows, Linux and Mac Operating Systems
  • Understand Various File Systems of Windows, Linux and Mac Operating Systems
  • Examine File System Using Autopsy and The Sleuth Kit Tools
  • Understand Storage Systems
  • Understand Encoding Standards and Hex Editors
  • Understand Data Acquisition Fundamentals
  • Understand Data Acquisition Methodology
  • Prepare an Image File for Examination
  • Understand Anti-forensics Techniques
  • Discuss Data Deletion and Recycle Bin Forensics
  • Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted
  • Explore Password Cracking/Bypassing Techniques
  • Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and
  • Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
  • Detect Program Packers and Footprint Minimizing Techniques
  • Understand Anti-forensics Countermeasures
  • Collect Volatile and Non-volatile Information
  • Perform Windows Memory and Registry Analysis
  • Examine the Cache, Cookie and History Recorded in Web Browsers
  • Examine Windows Files and Metadata
  • Understand ShellBags, LNK Files, and Jump Lists
  • Understand Text-based Logs and Windows Event Logs
  • Understand Volatile and Non-volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Demonstrate Memory Forensics Using Volatility & PhotoRec
  • Understand Mac Forensics
  • Understand Network Forensics
  • Explain Logging Fundamentals and Network Forensic Readiness
  • Summarize Event Correlation Concepts
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  • Perform Incident Detection and Examination with SIEM Tools
  • Monitor and Detect Wireless Network Attacks
  • Understand Web Application Forensics
  • Understand Internet Information Services (IIS) Logs
  • Understand Apache Web Server Logs
  • Understand the Functionality of Intrusion Detection System (IDS)
  • Understand the Functionality of Web Application Firewall (WAF)
  • Investigate Web Attacks on Windows-based Servers
  • Detect and Investigate Various Attacks on Web Applications
  • Understand the Dark Web
  • Determine How to Identify the Traces of Tor Browser during Investigation
  • Perform Tor Browser Forensics
  • Understand Database Forensics and its Importance
  • Determine Data Storage and Database Evidence Repositories in MSSQL Server
  • Collect Evidence Files on MSSQL Server
  • Perform MSSQL Forensics
  • Understand Internal Architecture of MySQL and Structure of Data Directory
  • Understand Information Schema and List MySQL Utilities for Performing Forensic
  • Perform MySQL Forensics on WordPress Web Application Database
  • Understand the Basic Cloud Computing Concepts
  • Understand Cloud Forensics
  • Understand the Fundamentals of Amazon Web Services (AWS)
  • Determine How to Investigate Security Incidents in AWS
  • Understand the Fundamentals of Microsoft Azure
  • Determine How to Investigate Security Incidents in Azure
  • Understand Forensic Methodologies for Containers and Microservices
  • Understand Email Basics
  • Understand Email Crime Investigation and its Steps
  • U.S. Laws Against Email Crime
  • Define Malware and Identify the Common Techniques Attackers Use to Spread Malware
  • Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis
  • Understand and Perform Static Analysis of Malware
  • Analyze Suspicious Word and PDF Documents
  • Understand Dynamic Malware Analysis Fundamentals and Approaches
  • Analyze Malware Behavior on System Properties in Real-time
  • Analyze Malware Behavior on Network in Real-time
  • Describe Fileless Malware Attacks and How they Happen
  • Perform Fileless Malware Analysis - Emotet
  • Understand the Importance of Mobile Device Forensics
  • Illustrate Architectural Layers and Boot Processes of Android and iOS Devices
  • Explain the Steps Involved in Mobile Forensics Process
  • Investigate Cellular Network Data
  • Understand SIM File System and its Data Acquisition Method
  • Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices
  • Perform Logical Acquisition on Android and iOS Devices
  • Perform Physical Acquisition on Android and iOS Devices
  • Discuss Mobile Forensics Challenges and Prepare Investigation Report
  • Understand IoT and IoT Security Problems
  • Recognize Different Types of IoT Threats
  • Understand IoT Forensics
  • Perform Forensics on IoT Devices

❓ Frequently Asked Questions

The cut off score for CHFI certification exam ranges from 60% to 85%.

After completing your Computer Hacking Forensic Investigator certification exam training, you will need to present certificate of attendance (COA) to EC-council to purchase the CHFI exam voucher.

Yes, you can extend EC-council's CHFI certification exam voucher for three months by paying a fee of USD $35.

Yes, you will able to extract and analyze logs from different devices like IPSes, IDSes, proxies, firewalls, desktops, laptops, SIM tools, routers, servers, switches, DHCP servers, AD servers, Access Control Systems etc.

The Computer Hacking Forensic Investigator training makes you able to do detailed evaluation of the activity evidence and data to analyze the possible circumstances and implications of the noticed even.

Still have questions?

Reach out to our learning advisors for personalized guidance on choosing the right course, group training, or enterprise packages.

πŸ“ž Talk to an Advisor

What You Get with Microtek Learning

Instructor-Led Excellence

  • Certified Instructor-led Training
  • Top Industry Trainers
  • Official Student Handbooks

Measurable Learning Outcomes

  • Pre- & Post-Training Assessments
  • Practice Tests
  • Exam-Oriented Curriculum

Real-World Skill Building

  • Hands-on Activities & Scenarios
  • Interactive Online Courses
  • Peer Collaboration (Not in self-paced)

Full Support & Perks

  • Exam Scheduling Support *
  • Learn & Earn Program *
  • Support from Certified Experts
  • Gov. & Private Pricing *

Our Clients

For over 10 years, Microtek Learning has helped organizations, leaders, students and professionals to reach their maximum potential. We have led the path by addressing their challenges and advancing their performances.

Actemium
US Dept of Defense
Education Advisory Board
GE Digital
Department of Homeland Security
Pacific Life
MetLife
AIG
Chase
DC Gov
Johnson & Johnson
William Osler Health System
Google

Our Awards

Microsoft Award

Microsoft Learning
Partner of the Year

Inc 5000

5000 List of the Fastest-Growing Private Companies in America

Top IT Training

Top IT Training Companies
(Multiple Years)

Why We Are Best To Choose?

Team Support

Professional Team Support

Our expert counseling team provides round-the-clock assistance with the best value offers.

Experienced Trainers

Experienced Trainers

Certified trainers with 5–15 years of real-world industry experience guide your learning.

Satisfaction Guarantee

100% Satisfaction Guarantee

We guarantee satisfaction with top-quality content and instructor delivery.

Real-World Experience

Real-World Experience

Train with industry projects and curricula aligned to current standards.

Best Price Guarantee

Best Price Guarantee

We promise the lowest pricing and best offers in the market.

Guaranteed to Run

Guaranteed to Run

All courses are assured to run on scheduled dates via all delivery methods.

EC-Council Learning Resources

Explore our collection of free resources to boost your EC-Council learning journey

Blogs

EC-Council Expert Blogs

Explore insights from industry experts to stay ahead in techβ€”dive into our Expert Blogs now!

Read Blogs
Talk to Advisor