NICF - CHFI - Computer Hacking Forensic Investigator (SF) COMAT Training Services Pte Ltd
Price: SGD 2,675

    Course details

    What Will Be Taught For This Computer Forensics Course?

    EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFI V9 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

    Module 01: Computer Forensics in Today's World

    Understanding Computer Forensics

    Why and When Do You Use Computer Forensics?

    Cyber Crime (Types of Computer Crimes)

    Case Study

    Challenges Cyber Crimes Present For Investigators

    Cyber Crime Investigation

    Rules of Forensics Investigation

    Understanding Digital Evidence

    Types of Digital Evidence

    Characteristics of Digital Evidence

    Role of Digital Evidence

    Sources of Potential Evidence

    Rules of Evidence

    Forensics Readiness

    Computer Forensics as part of an Incident Response Plan

    Need for Forensic Investigator

    Roles and Responsibilities of Forensics Investigator

    What makes a Good Computer Forensics Investigator?

    Investigative Challenges

    Legal and Privacy Issues

    Code of Ethics

    Accessing Computer Forensics

    Module 02: Computer Forensics Investigation Process

    Importance of Computer Forensics Process

    Phases Involved in the Computer Forensics Investigation Process

    Pre-investigation Phase

    Investigation Phase

    Post-investigation Phase

    Module 03: Understanding Hard Disks and File Systems

    Hard Disk Drive Overview

    Disk Partitions and Boot Process

    Understanding File Systems

    RAID Storage System

    File System Analysis

    Module 04: Data Acquisition and Duplication

    Data Acquisition and Duplication Concepts

    Static Acquisition

    Validate Data Acquisitions

    Acquisition Best Practices

    Module 05: Defeating Anti-forensics Techniques

    What is Anti-Forensic?

    Anti-Forensics Techniques

    Module 06: Operating System Forensics (Windows, Mac, Linux)

    Introduction to OS Forensics

    Windows Forensics

    Collecting Volatile Information

    Collecting Non-Volatile Information

    Analyze the Windows thumbcaches

    Windows Memory Analysis

    Windows Registry Analysis

    Cache, Cookie, and History Analysis

    Windows File Analysis

    Metadata Investigation

    Text Based Logs

    Other Audit Events

    Forensic Analysis of Event Logs

    Windows Forensics Tools

    Linux Forensics

    Shell Commands

    Linux Log files

    Collecting Volatile Data

    Collecting Non-Volatile Data

    MAC Forensics

    Introduction to MAC Forensics

    MAC Forensics Data

    MAC Log Files

    MAC Directories

    MAC Forensics Tools

    Module 07: Network Forensics

    Introduction to Network Forensics

    Fundamental Logging Concepts

    Event Correlation Concepts

    Network Forensic Readiness

    Network Forensics Steps

    Network Traffic Investigation

    Documenting the Evidence

    Evidence Reconstruction

    Module 08: Investigating Web Attacks

    Introduction to Web Application Forensics

    Web Attack Investigation

    Investigating Web Server Logs

    Web Attack Detection Tools

    Tools for Locating IP Address

    WHOIS Lookup Tools

    Module 09: Database Forensics

    Database Forensics and Its Importance

    MSSQL Forensics

    MySQL Forensics

    Module 10: Cloud Forensics

    Introduction to Cloud Computing

    Cloud Forensics

    Module 11: Malware Forensics

    Introduction to Malware

    Introduction to Malware Forensics

    Module 12: Investigating Email Crimes

    Email System

    Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)

    Email Message

    Steps to Investigate Email Crimes and Violation

    Email Forensic Tools

    Laws and Acts against Email Crimes

    Module 13: Mobile Phone Forensics

    Mobile Device Forensics

    Module 14: Forensics Report Writing and Presentation

    Writing Investigation Reports

    Expert Witness Testimony


    Updated on 18 August, 2019

    Eligibility / Requirements

    The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.Pre-requisiteParticipants are strongly recommended to attend the CEH course before enrolling into CHFI course.

    Job roles this course is suitable for:

    CEH , Certified Ethical Hacker , Ethical Hacker

    About COMAT Training Services Pte Ltd

    To be or not to be; this is the question which resides in us. All man of clay, our innate differences are subtle and few. The void spanning greatness hinges on existence of mean and will. COMAT holds an intrinsic belief that every inpidual has a potential to be realised. Betterment of society through advancement of its basic unit, empowerment through continuous learning – Upon these axioms were we founded, and today proudly uphold.

    Love for the people around us, a desire for a better world, our passion is our profession. COMAT believes learning is a lifelong process and key to a meaningful existence. Spearheaded by a renowned team of highly experienced and motivated trainers, COMAT offers an extensive array of IT, safety and leadership & professional development courses, providing inpiduals with the means to excel.

    While adhering to globally accepted quality standards, our intention goes beyond training and certification - COMAT provides a holistic experience, focusing on generation of inductive environments for stimulating philosophical thoughts. True learning lies in instillation of a sense of self-realisation, a will to become who they can be.

    We pride ourselves on our innovations, our desire for continuous improvement, and the ability to perceive the needs and wants of each inpidual. Customized approaches for varying needs, we conjure solutions tailored to fit.

    See all COMAT Training Services Pte Ltd courses
    Courses you can instantly connect with... Do an online course on Certified Ethical Hacker (CEH) starting now. See all courses

    Is this the right course for you?

    Didn't find what you were looking for ?

    or