Level: Foundation

Computer Hacking Forensic Investigator (CHFI)

5 Day | Instructor Led

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client systems, to tracing the originator of defamatory emails, to recovering signs of fraud.

The CHFI course will provide participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute in the court of law.

Inquire About:
Computer Hacking Forensic Investigator (CHFI)

Ideal Candidates for Computer Hacking Forensic Investigator (CHFI) Class

IT professionals involved with information system security, computer forensics, and incident response

Computer Hacking Forensic Investigator (CHFI) Prerequisites

Experience with Windows and/or UNIX/Linux operating systems

Knowledge of TCP/IP and networking

Security+ certification is recommended

Certified Ethical Hacker certification is strongly recommended

What You'll Get in Computer Hacking Forensic Investigator (CHFI)

CHFI Official Courseware

Up to 13Gs of tools, scripts, and additional information.

An image of Backtrack Linux is also provided for those that cannot download such a large file on their own. It is a combination of open source, freeware, and evaluation software.

Hands-on practice/skills development on hacking from both Microsoft and Linux

70 precent hands-on activity during the class

What You'll Learn in Computer Hacking Forensic Investigator (CHFI)

Law and computer forensics in todays world

How the computer investigation process and security incident response team work

Computer forensic laboratory requirements

Understanding file systems and hard disks

Windows forensics

Linux and Macintosh boot processes

Linux forensics

Data acquisition and duplication

Recovering deleted files

Image files forensics


Computer forensics tools

Application password crackers

Investigating logs and network traffic

Router forensics

Investigating web attacks and e-mail crimes, tracking e-mail

Mobile and PDA forensics

Investigating trademark and copyright infringement

Investigative reports and becoming an expert witness

Forensics in action

Computer Hacking Forensic Investigator (CHFI) Certification

The Computer Hacking Forensic Investigator exam EC0 312-49 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CHFI certification.

Computer Hacking Forensic Investigator (CHFI) Outline

1. Computer Forensics in Today's World

2. Computer Forensics Investigation Process

3. Searching and Seizing Computers

4. Digital Evidence

5. First Responder Procedures

6. Computer Forensics Lab

7. Understanding Hard Disks and File Systems

8. Windows Forensics

9. Data Acquisition and Duplication

10. Recovering Deleted Files and Deleted Partitions

11. Forensics Investigation Using AccessData FTK

12. Forensics Investigation Using EnCase

13. Steganography and Image File Forensics

14. Application Password Crackers

15. Log Capturing and Event Correlation

16. Network Forensics, Investigating Logs and Investigating Network Traffic

17. Investigating Wireless Attacks

18. Investigating Web Attacks

19. Tracking Emails and Investigating Email Crimes

20. Mobile Forensics

21. Investigative Reports

22. Becoming an Expert Witness


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. CEH provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEH courseware. Latest tools and exploits uncovered from the underground community are featured in the new package.

The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyze the subject material. In addition, network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.

EC-Council released the most advanced computer forensic investigation program in the world. This course covers major forensic investigation scenarios that enable you to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber attacks, the need for advanced cybersecurity and investigation training is critical. If you or your organization requires the knowledge or skills to identify, track, and prosecute cyber criminals, then this is the course for you. You will learn how to excel in digital evidence acquisition, handling, and forensically sound analysis. These skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats, and other intricate cases involving computer systems.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W