Computer Hacking Forensic Investigator (CHFI) Training

by Synergie Training Claim Listing

The CHFI Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel.

$2345

Contact the Institutes

Fill this form

Advertisement

Synergie Training Logo

img Duration

5 Days

Course Details

The CHFI Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crimes or misuse, including but not limited to; theft of trade secrets, theft of or destruction of intellectual property, and fraud. 

Computer forensic investigators can draw from an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. 

It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battle between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. 

Now, the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

 

Course Objectives:

  • Upon successful completion of this course, students will have learned:
  • • The computer forensic investigation process and the various legal issues involved
  • • Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
  • • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • • Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene
  • • How to set up a computer forensics lab and the tools involved in it
  • • Various file systems and how to boot a disk
  • • Gathering volatile and non-volatile information from Windows
  • • Data acquisition and duplication rules, validation methods and tools required
  • • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
  • • The process involved in forensic investigation using AccessData FTK and EnCase
  • • Steganography and its techniques, Steganalysis, and image file forensics
  • • Password Cracking Concepts, tools, types of password attacks and how to investigate password protected files
  • • Different types of log capturing, log management, time synchronization, and log capturing tools
  • • How to investigate logs, network traffic, wireless attacks, and web attacks
  • • How to track e-mails and investigate e-mail crimes
  • • Mobile forensics and mobile forensics software and hardware tools
  • • How to write investigative reports

 

Target Audience:

  • The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response:
  • • Police and other law enforcement personnel
  • • Defense and Military personnel
  • • e-Business Security professionals
  • • Systems administrators
  • • Legal professionals
  • • Banking, Insurance and other professionals
  • • Government agencies
  • • IT managers

 

Course Content:

  • • Computer Forensics in Today’s World
  • • Computer Forensics Investigation Process
  • • Searching and Seizing Computers
  • • Digital Evidence
  • • First Responder Procedures
  • • Computer Forensics Lab
  • • Understanding Hard Disks and File Systems
  • • Windows Forensics
  • • Data Acquisition and Duplication
  • • Recovering Deleted Files and Deleted Partitions
  • • Forensics Investigation Using AccessData FTK
  • • Forensics Investigation Using EnCase
  • • Steganography and Image File Forensics
  • • Application Password Crackers
  • • Log Capturing and Event Correlation
  • • Network Forensics, Investigating Logs and Investigating Network Traffic
  • • Investigating Wireless Attacks
  • • Investigating Web Attacks
  • • Tracking Emails and Investigating Email Crimes
  • • Mobile Forensics
  • • Investigative Reports
  • • Becoming an Expert Witness
  • Glasgow Branch

    272 Bath Street, Glasgow

Check out more IT Training courses in USA

Oregen Computer Training Logo

Microsoft Visio Training Course

This course is for new or inexperienced users of Visio who want to gain a basic understanding of how to use its main tools and features. Visio is a powerful diagramming program, which enables you to easily create many drawings from flowcharts and organization charts to network and web diagrams.

by Oregen Computer Training [Claim Listing ]
Oregen Computer Training Logo

Microsoft PowerPoint Training

This course is aimed at existing PowerPoint users who would like to improve their knowledge and/or speed up the way the presentation iscreated. You should have either attended the PowerPoint introductory course or be a regular user of PowerPoint.

by Oregen Computer Training [Claim Listing ]
Oregen Computer Training Logo

Microsoft Office 365 Training

Office 365 is a line of subscription services offered by Microsoft as part of the Microsoft Office product line. The brand encompasses plans that allow use of the Microsoft Office software suite over the life of the subscription, as well as cloud-based software as a service products for bu...

by Oregen Computer Training [Claim Listing ]
Oregen Computer Training Logo

Microsoft Word

This one day course is a comprehensive fast paced introduction to Word and covers all the features need to layout standard business documents in a professional way. Designed for the student who is already using Word or has attended the Introductory course and would like to expand their knowledge.

by Oregen Computer Training [Claim Listing ]
Oregen Computer Training Logo

Microsoft Excel Training

This course is designed for students who have already attended the introductory course or who already have a good working knowledge of Excel basics.

by Oregen Computer Training [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy