Welcome to ONLC Training Centers

Computer Hacking Forensics Investigator (CHFI) V10.0

Class Dates
(click date for class times)
(click Enroll for locations)

Fee:  $3495
Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.

Need a class for a group?

We can deliver this class for your group. Follow the link to request more information.

Email Alert

Receive an email when this class is available as "Ready to Run" or "Early Notice" status.

Train from your home or office

If you have high-speed internet and a computer you can likely take this class from your home or office.


Computer Hacking Forensics Investigator (CHFI) V10.0 Course Outline

Special Note to New Hampshire Residents
This course has not yet been approved by the New Hampshire Department of Education. Please contact us for an update on when the class will be available in New Hampshire.

Overview
EC-Council’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.

This intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.

Course Prerequisites
IT/forensics professionals with basic knowledge of IT/cybersecurity, computer forensics, incident response, and threat vectors.

Course Outline

Computer Forensics in Today’s World
Understand the Fundamentals of Computer Forensics
Understand Cybercrimes and their Investigation Procedures
Understand Digital Evidence and eDiscovery
Understand Forensic Readiness
Understand the Role of Various Processes and Technologies in Computer Forensics
Identify the Roles and Responsibilities of a Forensic Investigator
Understand the Challenges Faced in Investigating Cybercrimes
Understand Various Standards and Best Practices Related to Computer Forensics
Understand Laws and Legal Compliance in Computer Forensics

Computer Forensics Investigation Process
Understand the Forensic Investigation Process and its Importance
Understand First Response
Understand the Pre-investigation Phase
Understand the Investigation Phase
Understand the Post-investigation Phase

Understanding Hard Disks and File Systems
Describe Different Types of Disk Drives and their Characteristics
Explain the Logical Structure of a Disk
Understand the Booting Process of Windows, Linux, and macOS Operating Systems
Understand Various File Systems of Windows, Linux and macOS Operating Systems
Understand File System Analysis
Understand Storage Systems
Understand Encoding Standards and Hex Editors
Analyze Popular File Formats Using Hex Editor

Data Acquisition and Duplication
Understand Data Acquisition Fundamentals
Understand eDiscovery
Understand Data Acquisition Methodology
Prepare an Image File for Examination

Defeating Anti-forensics Techniques
Understand Anti-forensics Techniques
Discuss Data Deletion and Recycle Bin Forensics
Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
Explore Password Cracking/Bypassing Techniques
Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
Detect Program Packers and Footprint Minimizing Techniques

Windows Forensics
Understand Windows Forensics
Collect Volatile Information
Collect Non-volatile Information
Perform Windows Memory Analysis
Perform Windows Registry Analysis
Perform Electron Application Analysis
Perform Web Browser Forensics
Examine Windows Files and Metadata
Understand ShellBags, LNK Files, and Jump Lists
Understand Text-based Logs and Windows Event Logs

Linux and Mac Forensics
Collect Volatile Information in Linux
Collect Non-volatile Information in Linux
Understand Linux Memory Forensics
Understand Mac Forensics
Collect Volatile Information in Mac
Collect Non-volatile Information in Mac
Understand Mac Memory Forensics and Mac Forensics Tools

Network Forensics
Understand Network Forensics
Summarize Event Correlation Concepts
Identify Indicators of Compromise (IoCs) from Network Logs
Investigate Network Traffic
Perform Incident Detection and Examination Using SIEM Tools
Understand Wireless Network Forensics
Detect and Investigate Wireless Network Attacks

Malware Forensics
Understand Malware Concepts
Understand Malware Forensics
Perform Static Malware Analysis
Analyzing Suspicious Documents
Perform System Behavior Analysis
Perform Network Behavior Analysis
Perform Ransomware Analysis

Investigating Web Attacks
Understand Web Application Forensics
Understand Internet Information Services (IIS) Logs
Understand Apache Web Server Logs
Detect and Investigate Various Attacks on Web Applications

Dark Web Forensics
Understand the Dark Web and Dark Web Forensics
Determine How to Identify the Traces of Tor Browser during Investigation
Perform Tor Browser Forensics

Cloud Forensics
Understand Cloud Computing Concepts
Understand Cloud Forensics
Understand Amazon Web Services (AWS) Fundamentals
Perform AWS Forensics
Understand Microsoft Azure Fundamentals
Perform Microsoft Azure Forensics
Understand Google Cloud Fundamentals
Perform Google Cloud Forensics

Email and Social Media Forensics
Understand Email Basics
Explain Email Crime Investigation and its Steps
Understand U.S. Laws Against Email Crime
Explain Social Media Forensics

Mobile Forensics
Understand Mobile Device Forensics
Understand Android and iOS Architecture, Boot Process, and File Systems
Understand Mobile Forensics Process
Investigate Cellular Network Data
Perform File System Acquisition
Understand Phone Locks, Rooting, and Jailbreaking of Mobile Devices
Perform Logical Acquisition on Mobile Devices
Perform Physical Acquisition on Mobile Devices
Perform Android and iOS Forensic Analysis

IoT Forensics
Understand IoT Concepts
Perform Forensics on IoT Devices
View outline in Word

SCHFI1

Attend hands-on, instructor-led Computer Hacking Forensics Investigator (CHFI) V10.0 training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of CHFI Courses and select the one that's right for you.

GENERAL INFO

Class Format
Class Policies
Student Reviews


HAVE QUESTIONS?
First Name

Last Name

Company

Phone

Email

Location

Question/Comment



ONLC TRAINING CENTERS
800-288-8221
www.onlc.com