• Online, Instructor-Led
  • Online, Self-Paced
  • Classroom
Course Description

The Computer Hacking Forensic Investigator C|HFI covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. CHFI v9 certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.
What's Included
- Official Courseware
- iLabs, Online Labs (6 Months Access)
- Certification Exam Voucher

Learning Objectives

Perform incident response and computer forensics
Perform electronic evidence collections
Perform digital forensic acquisitions as an analyst
Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation
Examine and analyze text, graphics, multimedia, and digital images
Recover information and electronic data from computer hard drives and other data storage devices
Work on technical examination, analysis, and reporting of computer-based evidence
Investigate events for evidence of insider threats or attacks
Support the generation of incident reports and other collateral
Investigate and analyze all response activities related to cyber incidents
Plan, coordinate and direct recovery activities and incident analysis tasks
Conduct reverse engineering for known and suspected malware files
Identify and check the possible source/incident origin.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Digital Forensics
  • Program/Project Management and Acquisition
  • Cyber Defense Analysis
  • Cyber Operations
  • Incident Response