Travel to Class or join the Live Video Conference via WebEx.

WebEx brings you directly into the Classroom!

Live Online Video Conference gives you the flexibility and a cost effective way to attend Live training events from the convenience of your home, office or even while you travel.  Engineers Login and Participate in the LIVE course with other students attending the course in person.  Live Online students enjoy all the benefits as students who attend in person. Same Books, Same Labs, Same TestPrep, Same Access to the Instructor!  The only thing you miss out on is the travel, the traffic, all the extra expenses and the anxiety of making it to class on time.  WebEx is available on Windows, Linux, MacOS & Mobile devices.  No Excuses. Register today for a class and Get Certified!

Our Live Video Conference via WebEx connections bring you directly into the Classroom!

Computer Hacking Forensics Investigator

Course Title: Computer Hacking Forensic Investigator (CHFI) v9 Duration: 40 hours (5 days, 9:00AM – 5:00PM)
Class Format:

  • Instructor-led classroom – Authorized Training Center (ATC)
  • Live online training – iClass

 

Course Description:

CHFI v9 covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset
for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.

 

Certification/Specialization: 

C|HFI

 

Prerequisite Knowledge:

  • IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response
  • Prior completion of CEH training would be an advantage

 

Who Should Attend:

  • Anyone interested in cyber forensics/investigations
  • Attorneys, legal consultants, and lawyers
  • Law enforcement officers
  • Police officers
  • Federal/ government agents
  • Defense and military
  • Detectives/ investigators
  • Incident response team members
  • Information security managers
  • Network defenders
  • IT professionals, IT directors/ managers
  • System/network engineers
  • Security analyst/ architect/ auditors/ consultants

 

Job roles: Entry-level network engineer, network administrator, network support technician, and help desk technician.

 

Course Delivery Method:

This boot camp is approximately 60% lecture and 40% hands-on labs.  The instructor uses a combination of “Chalk talk” and “one on one mentoring”, the instructor will NOT always use an overhead projector.  We believe in traditional method of teaching where the subjects were taught and NOT lectured.  The classroom material is based on current C|HFI.

 

Military and Veteran Pricing

Internetwork Academy Appreciates your Service

CHFI Course Outline

 

Forensic Science

  • Computer Forensics Objective and Need
  • Forensics Readiness
  • Cyber Crime
  • Web Applications and Web servers Attacks
  • Email Crimes
  • Network Attacks
  • Forensics on Mobile Devices
  • Cyber Crime Investigation
  • Computer Forensics Investigation Methodology
  • Reporting a Cyber Crime
  • Expert Witness

 

Regulations, Policies and Ethics

  • Searching and Seizing Computers with and without a Warrant
  • Laws and Acts against Email Crimes
  • Laws pertaining to Log Management
  • Policies Pertaining to Mobile Forensics
  • Laws and Acts against Email Crimes
  • General Ethics While Testifying

 

Digital Evidence

  • Digital Evidence
  • Types of Digital Evidence
  • Rules of Evidence
  • Electronic Evidence: Types and Collecting Potential Evidence
  • Electronic Crime and Digital Evidence Consideration by Crime Category
  • Computer Forensics Lab
  • Understanding Hard Disks
  • Disk Partitions and Boot Process
  • Understanding File Systems
  • Windows File Systems
  • Linux File Systems
  • Mac OS X File Systems
  • RAID Storage System
  • File Carving
  • Image Files
  • Analyze Logs
  • Database Forensics
  • Email Headers
  • Analyzing Email headers
  • Malware Analysis
  • Mobile Operating Systems

Procedures and Methodology

  • Investigating Computer Crime
  • Computer Forensics Investigation Methodology
  • Digital Evidence Examination Process
  • Encryption
  • First Responder
  • First Response Basics
  • Data Acquisition and Duplication
  • Defeating Anti-forensics Techniques
  • Log Management and Event Correlation
  • Network Forensics (Intrusion Detection Systems (IDS))
  • Computer Forensics Reports and Investigative Report Writing

Digital Forensics

  • Recover Data
  • File System Analysis
  • Windows Forensics
  • Linux Forensics
  • MAC Forensics
  • Recovering the Deleted Files and Partitions
  • Steganography and Image File Forensics
  • Steganalysis
  • Application Password Crackers
  • Investigating and Analyzing Logs
  • Investigating Network Tra c
  • Investigating Wireless Attacks
  • Web Attack Investigation
  • Investigating Email Crime and Violation
  • Mobile Forensic Process
  • Cloud Forensics
  • Malware Forensics
  • Defeating Anti-Forensic Techniques

 

Tools / Systems / Programs

  • First Responder Toolkit
  • Windows Forensic Tools
  • Data Acquisition Software Tools
  • Tools to defeat Anti-Forensics
  • Steganography Tools
  • Database Forensics Tools
  • Password Cracking Tools
  • Network Forensics Tools
  • Web Security Tools
  • Cloud Forensics Tools
  • Malware Forensics Tools
  • Email Forensics Tools
  • Mobile Forensics Software and Hardware Tools
  • Report Writing Tools