EC-Council Computer Hacking Forensic Investigator (CHFIv9) - LCH101

Overview


This course presents a detailed methodological approach to computer forensics and evidence analysis. A Forensic Investigator must follow a process when investigating a cybercrime. This course covers that process along with major forensic investigation scenarios and hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry out a computer forensic investigation. This course prepares Cybersecurity practitioners for the EC-Council E|CHFI Certification that can lead to a successful career as a Forensic Investigator.


ENROLL IN THIS COURSE

Why you should attend

Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government, and corporate entities globally and many of them seek out practitioners that have the Digital Forensic Investigator CHFI Certific

Who should attend

If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensicall

What You'll learn

CHFI gives a complete overview of the process that a forensic investigator must follow when investigating a cybercrime. It includes not only the right treatment of the digital evidence in order to be accepted in the Courts but also useful tools and techni

Prerequisites

EC-Council Certified Network Defender (CND)

EC-Council Certified Ethical Hacking (CEH)

Recommended experience in the field of Cybersecurity Defense

  • The computer forensic investigation process and the various legal issues involved
  • Evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
  • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • How to set up a computer forensics lab and the tools involved in the lab
  • How to boot a disk
  • How to set up a computer forensics lab
  • How to gather volatile and nonvolatile information from Windows
  • How to recover deleted files and deleted partitions in Window, Mac OS X , and Linux
  • How to investigate logs, network traffic, wireless attacks, and web attacks
  • How to track emails and investigate email crimes
  • How to write investigative reports
ENROLL IN THIS COURSE

Schedule your course

Use the table below to select the time and location that works best for you.

Timezone: America/Chicago

September 2021

TBD
Sep 13th, 2021-Sep 25th, 2021
SELECT THIS DATE
TBD
Sep 14th, 2021-Sep 25th, 2021
SELECT THIS DATE
ENROLL IN THIS COURSE