NICF - CHFI - Computer Hacking Forensic Investigator (SF) COMAT Training Services Pte Ltd
Price: AED 7,092
  • Duration: 5 Days

Course details

What Will Be Taught For This Computer Forensics Course?

EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFI V9 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Module 01: Computer Forensics in Today's World

Understanding Computer Forensics

Why and When Do You Use Computer Forensics?

Cyber Crime (Types of Computer Crimes)

Case Study

Challenges Cyber Crimes Present For Investigators

Cyber Crime Investigation

Rules of Forensics Investigation

Understanding Digital Evidence

Types of Digital Evidence

Characteristics of Digital Evidence

Role of Digital Evidence

Sources of Potential Evidence

Rules of Evidence

Forensics Readiness

Computer Forensics as part of an Incident Response Plan

Need for Forensic Investigator

Roles and Responsibilities of Forensics Investigator

What makes a Good Computer Forensics Investigator?

Investigative Challenges

Legal and Privacy Issues

Code of Ethics

Accessing Computer Forensics

Module 02: Computer Forensics Investigation Process

Importance of Computer Forensics Process

Phases Involved in the Computer Forensics Investigation Process

Pre-investigation Phase

Investigation Phase

Post-investigation Phase

Module 03: Understanding Hard Disks and File Systems

Hard Disk Drive Overview

Disk Partitions and Boot Process

Understanding File Systems

RAID Storage System

File System Analysis

Module 04: Data Acquisition and Duplication

Data Acquisition and Duplication Concepts

Static Acquisition

Validate Data Acquisitions

Acquisition Best Practices

Module 05: Defeating Anti-forensics Techniques

What is Anti-Forensic?

Anti-Forensics Techniques

Module 06: Operating System Forensics (Windows, Mac, Linux)

Introduction to OS Forensics

Windows Forensics

Collecting Volatile Information

Collecting Non-Volatile Information

Analyze the Windows thumbcaches

Windows Memory Analysis

Windows Registry Analysis

Cache, Cookie, and History Analysis

Windows File Analysis

Metadata Investigation

Text Based Logs

Other Audit Events

Forensic Analysis of Event Logs

Windows Forensics Tools

Linux Forensics

Shell Commands

Linux Log files

Collecting Volatile Data

Collecting Non-Volatile Data

MAC Forensics

Introduction to MAC Forensics

MAC Forensics Data

MAC Log Files

MAC Directories

MAC Forensics Tools

Module 07: Network Forensics

Introduction to Network Forensics

Fundamental Logging Concepts

Event Correlation Concepts

Network Forensic Readiness

Network Forensics Steps

Network Traffic Investigation

Documenting the Evidence

Evidence Reconstruction

Module 08: Investigating Web Attacks

Introduction to Web Application Forensics

Web Attack Investigation

Investigating Web Server Logs

Web Attack Detection Tools

Tools for Locating IP Address

WHOIS Lookup Tools

Module 09: Database Forensics

Database Forensics and Its Importance

MSSQL Forensics

MySQL Forensics

Module 10: Cloud Forensics

Introduction to Cloud Computing

Cloud Forensics

Module 11: Malware Forensics

Introduction to Malware

Introduction to Malware Forensics

Module 12: Investigating Email Crimes

Email System

Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)

Email Message

Steps to Investigate Email Crimes and Violation

Email Forensic Tools

Laws and Acts against Email Crimes

Module 13: Mobile Phone Forensics

Mobile Device Forensics

Module 14: Forensics Report Writing and Presentation

Writing Investigation Reports

Expert Witness Testimony


Updated on 18 August, 2019

Eligibility / Requirements

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.Pre-requisiteParticipants are strongly recommended to attend the CEH course before enrolling into CHFI course.

Job roles this course is suitable for:

CEH , Certified Ethical Hacker , Ethical Hacker

About COMAT Training Services Pte Ltd

To be or not to be; this is the question which resides in us. All man of clay, our innate differences are subtle and few. The void spanning greatness hinges on existence of mean and will. COMAT holds an intrinsic belief that every inpidual has a potential to be realised. Betterment of society through advancement of its basic unit, empowerment through continuous learning – Upon these axioms were we founded, and today proudly uphold.

Love for the people around us, a desire for a better world, our passion is our profession. COMAT believes learning is a lifelong process and key to a meaningful existence. Spearheaded by a renowned team of highly experienced and motivated trainers, COMAT offers an extensive array of IT, safety and leadership & professional development courses, providing inpiduals with the means to excel.

While adhering to globally accepted quality standards, our intention goes beyond training and certification - COMAT provides a holistic experience, focusing on generation of inductive environments for stimulating philosophical thoughts. True learning lies in instillation of a sense of self-realisation, a will to become who they can be.

We pride ourselves on our innovations, our desire for continuous improvement, and the ability to perceive the needs and wants of each inpidual. Customized approaches for varying needs, we conjure solutions tailored to fit.

See all COMAT Training Services Pte Ltd courses
Courses you can instantly connect with... Do an online course on Certified Ethical Hacker (CEH) starting now. See all courses

Is this the right course for you?

Didn't find what you were looking for ?

or