Computer Hacker Forensic Investigator (CHFI v10)
The CHFI v10 includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.
CHFI v10 is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.
How you’ll benefit
This class will help you:
- Prepare you for the CHFI exam
Why Attend with Current Technologies CLC
- Our Instructors are in the top 10%
- Our Lab has a dedicated 1 Gig Fiber Connection for our Labs
- Our Labs Run up to Date Code for all our courses
Upon completing this course, the student will be able to meet these objectives:
- EC-Council is one of the few ANSI 17024 accredited institutions globally that specializes in Information Security.
- The Computer Hacking Forensic Investigator (CHFI) credential is an ANSI 17024 accredited certification.
- The CHFI v10 program has been redesigned and updated after a thorough investigation into current market requirements, job tasks analysis, and the recent industry focus on forensic skills.
Who Should Attend
The job roles best suited to the material in this course are:
- Penetration Testers
- Ethical Hackers
- Information Security Consultants
- Security Testers
- Security Analysts
- Security Engineers
- Network Server Administrators
- Firewall Administrators
- Systems Administrators
- Risk Management Professionals
AGE REQUIREMENTS AND POLICIES CONCERNING MINORS
- The age requirement for attending the training or attempting the CSCU exam is restricted to any candidate that is at least 13 years old.
- If the candidate is under the age of 13, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center (ATC) or EC-Council a written consent of their parent or their legal guardian and a supporting letter from their institution of higher learning. Only applicants from nationally accredited institutions of higher learning shall be considered.
- EC-Council reserves the right to impose additional restriction to comply with the policy. Failure to act in accordance with this clause shall render the authorized training center (ATC) in violation of their agreement with EC-Council. EC-Council reserves the right to revoke the certification of any person in breach of this requirement.
To fully benefit from this course, you should have the following knowledge:
- IT/forensics professionals with basic knowledge of IT/cybersecurity, computer forensics, and incident response
Module 01: Computer Forensics in Today's World
Module 02: Computer Forensics Investigation Process
Module 03: Understanding Hard Disks and File Systems
Module 04: Data Acquisition and Duplication
Module 05: Defeating Anti-Forensics Techniques
Module 06: Windows Forensics
Module 07: Linux and Mac Forensics
Module 08: Network Forensics
Module 09: Investigating Web Attacks
Module 10: Dark Web Forensics
Module 11: Database Forensics
Module 12: Cloud Forensics
Module 13: Investigating Email Crimes
Module 14: Malware Forensics
Module 15: Mobile Forensics
Module 16: IoT Forensics