Computer Hacking Forensic Investigator v9 (CHFI)

Course Overview

A criminal always leaves a trace of evidence behind.  Become a CHFI with EC-Council’s online course on CHFI certification.  This online training course certifies individuals in forensic security discipline from a vendor-neutral perspective and enhances their knowledge of digital forensics to investigate and prevent cyber attacks efficiently.  Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Audience

Police and other law enforcement personnel

Defense and Military personnel

e-Business Security professionals

Systems administrators

Legal professionals

Banking, Insurance and other professionals

Government agencies

IT managers

Course Outline

Overview

Computer Forensics In Todays World

Computer Forensics In Todays World Part 2

Computer Forensics In Todays World Part 3

Computer Forensics In Todays World Part 4

Computer Forensics In Todays World Part 5

The Investigation Process

The Investigation Process Part 2

The Investigation Process Part 3

The Investigation Process Part 4

The Investigation Process Part 5

The Investigation Process Part 6

The Investigation Process Part 7

Investigative Tools Demonstration

Hard Disks And File Systems

Hard Disks And File Systems Part 2

Hard Disks And File Systems Part 3

Hard Disks And File Systems Part 4

Forensic File System Tools Demonstration

Data Acquisition And Duplication

Data Acquisition And Duplication Part 2

Data Acquisition And Duplication Part 3

Data Acquisition Tools Demonstration

Defeating Anti-Forensic Techniques

Defeating Anti-Forensic Techniques Part 2

Defeating Anti-Forensic Techniques Part 3

Defeating Anti-Forensic Techniques Part 4

Anti-Forensics Tools Demonstration

Operating System Forensics

Operating System Forensics Part 2

Operating System Forensics Part 3

Operating System Forensics Part 4

Operating System Forensics Part 5

Operating System Forensics Part 6

Network Forensics

Network Forensics Part 2

Network Forensics Part 3

Network Forensics Part 4

Investigating Web Attacks

Investigating Web Attacks Part 2

Investigating Web Attacks Part 3

Investigating Web Attacks Part 4

Investigating Web Attacks Part 5

Investigating Web Attacks Part 6

Database Forensics

Database Forensics Part 2

Cloud Forensics

Cloud Forensics Part 2

Cloud Forensics Part 3

Cloud Forensics Part 4

Malware Forensics

Malware Forensics Part 2

Investigating Email Crimes

Investigating Email Crimes Part 2

Investigating Email Crimes Part 3

Mobile Forensics

Mobile Forensics Part 2

Mobile Forensics Part 3

Forensics Report Writing And Presentation


₦ 30,000

  • Learn at your own pace with 24/7 access
  • Duration: 1 year
× How can we help you?