- Ways to Train:
- Live Classroom Class is delivered at a Centriq location with a live instructor actually in the classroom.
- Live Virtual Class Class is delivered live online via Centriq's Virtual Remote technology. Student may attend class from home or office or other location with internet access.
- HD Class Class is delivered via award winning HD-ILT at Centriq's facility. Students view the live instructor utilizing a 60'' HD monitor.
- Ways to Buy:
- Retail Class can be purchased directly via check, credit card, or PO.
- CV Centriq Vouchers Class is available for students using Centriq Vouchers.
- AP AP Eligible Class is available to students utilizing Centriq's unique Annual Pass program.
- SA SATV Eligible Class is available for students utilizing Microsoft Software Assurance Training Vouchers.
- CLC Cisco Learning Credit Class is available for students using Cisco Learning Credits.
|Start Date||End Date||Duration||Days||Start Time||End Time||Time Zone||Location||Ways to Train||Ways to Buy||Price|
|Request a Date|
CHFI v9 covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution.
All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.
It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout computer forensic investigation leading to prosecution of perpetrators CHFI presents a methodological approach to computer forensic including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.
What’s new in CHFI v9
- 14 comprehensive modules and 39 labs
- More than 40 percent of new labs
- More than 400 new/updated tools
- Classroom friendly curriculum with diagrammatic representation of concepts and examples
- New and rich presentation style with eye catching graphics
- Coverage of latest operating systems
- Updated patch management and testing environment
- Well tested, result oriented, descriptive and analytical lab manual to evaluate the presented concepts
This course is intended for many audiences, including the following:
- Anyone interested in cyber forensics/investigations
- Attorneys, legal consultants, and lawyers
- Law enforcement officers
- Police officers
- Federal/ government agents
- Defense and military
- Detectives/ investigators
- Incident response team members
- Information security managers
- Network defenders
- IT professionals, IT directors/managers
- System/network engineers
- Security analyst/ architect/auditors/consultants
- IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response
- Prior completion of CEH training would be an advantage
After completing the course, students will be able to:
- Implement the process of investigating cybercrime, laws involved, and the details in obtaining and executing a search warrant.
- Identify different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category.
- Assume the role of first responder to IT security incidents. This includes building and using the first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence and reporting the crime scene.
- Recover deleted files and deleted partitions in Windows, Mac OS X, and Linux.
- Recover deleted email, images, documents, and other files containing relevant evidence.
- Conduct a forensic investigation using Access Data FTK and Encase.
- Identify the use of steganography and its techniques, and conduct steganalysis.
- Analyze image files for forensic data.
- Use password cracking tools and various types of password attacks to investigate password protected file breaches.
- Identify different types of log capturing techniques, log management, time synchronization and log capturing tools.
- Investigate logs, network traffic, wireless attacks, and web attacks.
View Course Outline
- Module 01 Computer Forensics in Today's World
- Module 02 Computer Forensics Investigation Process
- Module 03 Understanding Hard Disks and File Systems
- Module 04 Data Acquisition and Duplication
- Module 05 Defeating Anti-forensics Techniques
- Module 06 Operating System Forensics (Windows, Mac,
- Module 07 Network Forensics
- Module 08 Investigating Web Attacks
- Module 09 Database Forensics
- Module 10 Cloud Forensics
- Module 11 Malware Forensics
- Module 12 Investigating Email Crimes
- Module 13 Mobile Forensics
- Module 14 Forensics Report Writing and Presentation