ESSOKA CYBERSECURITY DIVISION
  • Home
    • CYBERWIKI
    • STATISTICS
  • ECSD SERVICES
    • OUR CYBER TEAM
    • INDUSTRY SOLUTIONS >
      • All GFI Solutions
      • Checkpoint Solutions
      • Kaspersky
  • EC-COUNCIL
    • CERTIFICATIONS
    • ECSD ATC
    • iWeek (Live Online Classes)
    • CODRED
    • Ohphish
  • SECURITY
  • Portfolio
    • POLICY FRAMEWORK >
      • ANTIC
      • Cyberlaws in different countries
    • EDUCATION >
      • ACCREDITED TRAINING >
        • CSCU
        • CEHV9
        • CHFI
    • PARTNER4AFRICA CYBER PROJECT
    • Cyber4Africa (C4A) Project Details
  • Philosophy
  • Français
    • PIRATE INFORMATIQUE CERTIFIÉ
    • ENQUÊTEUR DE LA CRIMINALISTIQUE INFORMATIQUE
    • SERVICES
  • Contact
    • Blog and Mail >
      • RSS Feed
    • ECSD ADMIN
Computer Hacking Forensic Investigator
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFI presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to
acquire hands-on experience on various forensic investigation techniques and standard tools
necessary to successfully carry-out a computer forensic investigation.
 
Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of
sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a
mandate in the present day. If you or your organization requires the knowledge or skills to identify,
track, and prosecute the cybercriminals, then this is the course for you.
 
This course helps students to excel in digital evidence acquisition, handling and analysis in a
forensically sound manner. Acceptable in a court of law, these skills will lead to successful
prosecutions in various types of security incidents such as data breaches, corporate espionage,
insider threats and other intricate cases involving computer systems.


             Key Features in CHFI
  • CHFI iLabs (subscription based) - Students now can dynamically access a host of Virtual Machines preconfigured with forensics tools and evidence file from anywhere with an internet connection.
  • This is a cloud based subscription service from EC-Council designed to deliver serious hands on practice for the information security professional.
  • The cloud portal enables a course participant to launch an entire range of victim machines and access them remotely with just a few clicks. It is the most cost effective, easy to use, live range lab solution available globally today.
  • Evidence file - Meant for students to practice forensic investigation tools presented in the lab manual.
  • Students will use these files to simulate real world forensic investigation.
  • Forensics Challenges - Given at the end of lab manual as an exercise for the students to try out by examining the respective forensic challenge file provided in DVD and come up with the evidence found in it.
Sample results for the forensic challenge are also provided in the lab manual.
            
             Core Modules

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedures
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Deleted Partitions
  • Forensics Investigation Using AccessData FTK
  • Forensics Investigation Using EnCase
  • Steganography and Image File Forensics
  • Application Password Crackers
  • Log Capturing and Event Correlation
  • Network Forensics, Investigating Logs
  • and Investigating Network Traffic
  • Investigating Wireless Attacks
  • Investigating Web Attacks
  • Tracking Emails and Investigating
  • Email Crimes
  • Mobile Forensics
  • Investigative Reports
  • Becoming an Expert Witness
Who should Attend?
The CHFI program is designed for all IT professionals Involved with Information system security,
computer forensics, and incident response.


Duration: 3 Months
 
Exam Information
Exam Questions    : 150 Questions
Exam Duration      : 4 Hours
Passing Score        : 70%

 For more information about the CHFI, Contact ECSD

© 2015-2024 Essoka Cybersecurity Division (ECSD), A Postindustrial Entity of Essoka Corporation , - A BTH Education Group International Corporation Development (ICD)  Protégé.
2024 C4A Affiliates:
Standardization of Digital Literacy 2024 - Information Security Literacy for Africa 2024  - Cyber4Africa Technocracy Program.
  • Home
    • CYBERWIKI
    • STATISTICS
  • ECSD SERVICES
    • OUR CYBER TEAM
    • INDUSTRY SOLUTIONS >
      • All GFI Solutions
      • Checkpoint Solutions
      • Kaspersky
  • EC-COUNCIL
    • CERTIFICATIONS
    • ECSD ATC
    • iWeek (Live Online Classes)
    • CODRED
    • Ohphish
  • SECURITY
  • Portfolio
    • POLICY FRAMEWORK >
      • ANTIC
      • Cyberlaws in different countries
    • EDUCATION >
      • ACCREDITED TRAINING >
        • CSCU
        • CEHV9
        • CHFI
    • PARTNER4AFRICA CYBER PROJECT
    • Cyber4Africa (C4A) Project Details
  • Philosophy
  • Français
    • PIRATE INFORMATIQUE CERTIFIÉ
    • ENQUÊTEUR DE LA CRIMINALISTIQUE INFORMATIQUE
    • SERVICES
  • Contact
    • Blog and Mail >
      • RSS Feed
    • ECSD ADMIN