Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Infotec, LLC
  4. Infotec Computer Hacking Forensics Investigator Class (EC Council)

Infotec Computer Hacking Forensics Investigator Class (EC Council)

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
ITCHFI
Course Prerequisites

N/A

Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Classroom
Online, Instructor-Led
Course Location

100 Constitution Drive
Virginia Beach, VA 23462

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led

Learning Objectives

  • Utilize standard forensic tools to successfully carryout a computer forensic investigation
  • Prepare you to aid in the prosecution of perpetrators

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Digital Forensics

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: