Ideal Candidates for Computer Hacking Forensic Investigator (CHFI) Class
IT professionals involved with information system security, computer forensics, and incident response
Computer Hacking Forensic Investigator (CHFI) Prerequisites
Experience with Windows and/or UNIX/Linux operating systems
Knowledge of TCP/IP and networking
Security+ certification is recommended
Certified Ethical Hacker certification is strongly recommended
What You'll Get in Computer Hacking Forensic Investigator (CHFI)
CHFI Official Courseware
Up to 13Gs of tools, scripts, and additional information.
An image of Backtrack Linux is also provided for those that cannot download such a large file on their own. It is a combination of open source, freeware, and evaluation software.
Hands-on practice/skills development on hacking from both Microsoft and Linux
70 precent hands-on activity during the class
What You'll Learn in Computer Hacking Forensic Investigator (CHFI)
Law and computer forensics in todays world
How the computer investigation process and security incident response team work
Computer forensic laboratory requirements
Understanding file systems and hard disks
Windows forensics
Linux and Macintosh boot processes
Linux forensics
Data acquisition and duplication
Recovering deleted files
Image files forensics
Steganography
Computer forensics tools
Application password crackers
Investigating logs and network traffic
Router forensics
Investigating web attacks and e-mail crimes, tracking e-mail
Mobile and PDA forensics
Investigating trademark and copyright infringement
Investigative reports and becoming an expert witness
Forensics in action
Computer Hacking Forensic Investigator (CHFI) Certification
The Computer Hacking Forensic Investigator exam EC0 312-49 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CHFI certification.
Computer Hacking Forensic Investigator (CHFI) Outline
1. Computer Forensics in Today's World
2. Computer Forensics Investigation Process
3. Searching and Seizing Computers
4. Digital Evidence
5. First Responder Procedures
6. Computer Forensics Lab
7. Understanding Hard Disks and File Systems
8. Windows Forensics
9. Data Acquisition and Duplication
10. Recovering Deleted Files and Deleted Partitions
11. Forensics Investigation Using AccessData FTK
12. Forensics Investigation Using EnCase
13. Steganography and Image File Forensics
14. Application Password Crackers
15. Log Capturing and Event Correlation
16. Network Forensics, Investigating Logs and Investigating Network Traffic
17. Investigating Wireless Attacks
18. Investigating Web Attacks
19. Tracking Emails and Investigating Email Crimes
20. Mobile Forensics
21. Investigative Reports
22. Becoming an Expert Witness
Testimonials
A. Erlich
RITSC, N6CI just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.