• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

CHFI presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Learning Objectives

  • Module 1: Computer Forensics in Today’s World
  • Module 2:  Law and Computer Forensics
  • Module 3: Computer Investigation Process
  • Module 4: First Responder Procedure
  • Module 5: CSIRT
  • Module 6: Computer Forensic Lab
  • Module 7: Understanding File Systems and Hard Disks
  • Module 8: Understanding Digital Media Devices
  • Module 9: Windows, Linux and Macintosh Boot Processes
  • Module 10: Windows Forensics
  • Module 11: Linux Forensics
  • Module 12: Data Acquisition and Duplication
  • Module 13: Computer Forensic Tools
  • Module 14: Forensics Investigations Using Encase
  • Module 15: Recovering Deleted Files and Deleted partitions
  • Module 16: Image Files Forensics
  • Module 17: Steganography
  • Module 18: Application Password Crackers
  • Module 19: Network Forensics and Investigating Logs
  • Module 20: Investigating Network Traffic
  • Module 21: Investigating Wireless Attacks
  • Module 22: Investigating Web Attacks
  • Module 23: Router Forensics
  • Module 24: Investigating DoS Attacks
  • Module 25: Investigating Internet Crimes
  • Module 26: Tracking E-mails and Investigating E-mail Crimes
  • Module 27: Investigating Corporate Espionage
  • Module 28: Investigating Trademark and Copyright Infringement
  • Module 29: Investigating Sexual Harassment Incidents
  • Module 30: Investigating Child Pornography
  • Module 31: PDA Forensics
  • Module 32: iPod Forensics
  • Module 33: Blackberry Forensics
  • Module 35: Investigative Reports
  • Module 36: Becoming an Expert Witness

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.