skip to content
Certified Ethical Hacker and Computer Hacking Certification classes

Class is offered on the following dates (click on a date to register):







EC-Council Computer Hacking Forensic Investigator (CHFI Certification Class)


Course code: 10186

Prerequisites: None.

Price (plus GST): $1,995.00

Duration: 5 days

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no loger a matter of "will your organization be comprised (hacked)?" but, rather, "when?" If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits as well to prevent future attacks. Further to reporting computer forensics is the application of investigation and analysis techniques in the interests of determining presentable legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases.

  • Disloyal employees
  • Computer break-ins
  • Possession of pornography
  • Breach of contract
  • Industrial espionage
  • E-mail Fraud
  • Bankruptcy
  • Disputed dismissals
  • Web page defacements
  • Theft of company documents

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.

Who Should Attend
The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.
 
• Police and other law enforcement personnel
• Defense and Military personnel
• e-Business Security professionals
• Systems administrators
• Legal professionals
• Banking, Insurance and other professionals
• Government agencies
• IT managers

Certification
Computer Hacking Forensic Investigator (EC-Council) certification is awarded after successfully passing the EC-Council Prometric exam EC0 312-49. An exam will be held on the final day of the course. Students must pass the exam within one year from course completion in order to become certified.

Outline:
The CHFI course will provide participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.
• Computer Forensics in Today’s World
• Law and Computer Forensics
• Computer Investigation Process
• First Responder Procedure
• CSIRT
• Computer Forensic Lab
• Understanding File Systems and Hard Disks
• Understanding Digital Media Devices
• Windows, Linux and Macintosh Boot Processes
• Windows Forensics
• Linux Forensics
• Data Acquisition and Duplication
• Computer Forensic Tools
• Forensics Investigations Using Encase
• Recovering Deleted Files and Deleted partitions
• Image Files Forensics
• Steganography
• Application Password Crackers
• Network Forensics and Investigating Logs
• Investigating Network Traffic
• Investigating Wireless Attacks
• Investigating Web Attacks
• Router Forensics
• Investigating DoS Attacks
• Investigating Internet Crimes
• Tracking E-mails and Investigating E-mail Crimes
• Investigating Corporate Espionage
• Investigating Trademark and Copyright Infringement
• Investigating sexually harassment incidents
• Investigating Child Pornography
• PDA Forensics
• iPod Forensics
• Blackberry Forensics
• Investigative Reports
• Becoming an Expert Witness