• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

The CHFI program will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal". It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?". Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

Learning Objectives

Use advanced forensic tools; Determine and explain types of encryption, data hiding and anti-forensics techniques and their significance; Detect activities from browser, peer-to-peer network, cloud, file sharing and social media artifacts; Generate relevant findings from the registry, logs, metadata and other artifacts

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Competency Areas

Work Roles