HOME / CHFI

CHFI - Computer Hacking Forensic Investigator


The CHFI course will give participants the necessary skills to identify intruders’ foot prints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battle between corporations, governments and countries are no longer fought only in the typical arenas of board rooms or battle fields using physical force. Now, the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge of skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

  • Computer Forensics in Today's World
  • Computer Forensics Investigation Process
  • Searching and Seizing of Computers
  • Digital Evidence
  • First Responder Procedures
  • Incident Handling
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Digital Media Devices
  • CD/DVD Forensics
  • Windows Linux Macintosh Boot Process
  • Windows Forensics I
  • Windows Forensics II
  • Linux Forensics
  • Mac Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigations Using Access Data FTK
  • Forensics Investigations Using Encase
  • Steganography
  • Image Files Forensics
  • Audio File Forensics
  • Video File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics and Investigating Logs
  • Investigating Network Traffic
  • Router Forensics
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Investigating DOS Attacks
  • Investigating Virus, Trojan, Spyware and Rootkit Attacks
  • Investigating Internet Crimes
  • Tracking Emails and Investigating Email Crimes
  • PDA Forensics
  • Blackberry Forensics
  • iPod and iPhone Forensics
  • Cell Phone Forensics
  • USB Forensics
  • Printer Forensics
  • Investigating Corporate Espionage
  • Investigating Computer Data Breaches
  • Investigating Trademarks and Copyright Infringement
  • Investigating Sexual Harassment Incidents
  • Investigating Child Pornography Cases
  • Investigating Identity Theft Cases
  • Investigating Defamation over Websites and Blog Postings
  • Investigating Search keywords
  • Investigative Reports
  • Become an Expert Witness
  • How to become a digital detective
  • Computer Forensics for Lawyers
  • Law and Computer Forensics
  • Computer Forensics and Legal Compliance
  • Security Policies
  • Risk Assessment
  • Evaluation and Certification of Information Systems
  • Ethics in Computer Forensics
  • Computer Forensic Tools
  • Windows Based Command Line Tools
  • Windows Based GUI Tools
  • Forensics Frameworks
  • Forensics Investigation Templates
  • Computer Forensics Consulting Companies
Quick Inquiry
Data Item 2