CHFI - Computer Hacking Forensic Investigator - ELEARNING SELF PACED
On -line course: Computer Hacking Forensic Investigator - Chfi
This official EC-Council provides completely online and pre-recorded training, in various languages including English, for the preparation independently of the Chfi.
The Computer Hacking course Forensic Investigator (CHFI) covers the main forensic investigation scenarios, allows students to acquire the necessary practical experience, through various techniques and instruments of forensic investigation, and therefore be able to successfully carry out an IT investigation.
The Computer Hacking course Forensic Investigator (CHFI) covers the main forensic investigation scenarios, allows students to acquire the necessary practical experience, through various techniques and instruments of forensic investigation, and therefore be able to successfully carry out an IT investigation.

Objectives of the course
CHFI presents a methodological approach to forensic information technology that includes the acquisition, conservation, analysis and reporting of digital tests.
In particular, it covers the following issues:
- establish information on threats and key points to support the profiling and modeling of the scenarios
- perform the detection of anti -Forensse methods
- to perform post -intro -intrusion analyzes of electronic and digital supports to determine who, where, what, when and how the intrusion has occurred
- extract and analyze the registers from various devices such as proxy, firewall, IPS, Ids, desks, desktop, desktop, Laptop, server, SIM tool, router, firewall, Switch server ad, DHCP registers, access control registers and conclude as part of the investigation process.
- Identify and verify the possible source/origin of the accident.
- recover files and partitions deleted in Windows, Mac OS X and Linux
- Perform the Reverse Engineering for known and suspicious malware files
- collect data using forensic technology methods in accordance with test processing procedures, including the collection of paper and electronic documents
In particular, it covers the following issues:
- establish information on threats and key points to support the profiling and modeling of the scenarios
- perform the detection of anti -Forensse methods
- to perform post -intro -intrusion analyzes of electronic and digital supports to determine who, where, what, when and how the intrusion has occurred
- extract and analyze the registers from various devices such as proxy, firewall, IPS, Ids, desks, desktop, desktop, Laptop, server, SIM tool, router, firewall, Switch server ad, DHCP registers, access control registers and conclude as part of the investigation process.
- Identify and verify the possible source/origin of the accident.
- recover files and partitions deleted in Windows, Mac OS X and Linux
- Perform the Reverse Engineering for known and suspicious malware files
- collect data using forensic technology methods in accordance with test processing procedures, including the collection of paper and electronic documents
Content
The course includes:
- Training Modules (Access for 1 year)
- Official Digital Matterile Digotic Matterile (Access for 1 year)
- Cyberq Labs (Access for 6 months)
- Certificate of completion
- Exam Voucher
Topics:
- Forensic IT Investigation process
- Understanding of rigid discs and File System
- Forensic analysis of the operating system
- Defeat anti -Forens' techniques
- Acquisition and duplication of data
- Forensic network analysis
- Web attacks
- Forensic Database
- Cloud Forensics
- Forensic malware
- Investigating on e -mail crimes
- Forensic Mobile
- Investigative relationships
- Training Modules (Access for 1 year)
- Official Digital Matterile Digotic Matterile (Access for 1 year)
- Cyberq Labs (Access for 6 months)
- Certificate of completion
- Exam Voucher
Topics:
- Forensic IT Investigation process
- Understanding of rigid discs and File System
- Forensic analysis of the operating system
- Defeat anti -Forens' techniques
- Acquisition and duplication of data
- Forensic network analysis
- Web attacks
- Forensic Database
- Cloud Forensics
- Forensic malware
- Investigating on e -mail crimes
- Forensic Mobile
- Investigative relationships
Recipients
The course is aimed at law enforcement staff, system administrators, security agents, defense and military personnel, legal professionals, bankers and computer security professionals.
EXAMINATION:
The course prepares to take the CHFI EC0 312-49 exam
.
Number of questions: 150
Test format: Multiple choice
Duration: 4 hours
.
Number of questions: 150
Test format: Multiple choice
Duration: 4 hours
PRICE:
1,238,00 € + VAT