The Computer Hacking Forensics Investigator (CHFI) course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware, and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be compromised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now, the battlefield starts in the technical realm, which ties into almost every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.
Student Testimonials
Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus.
Student
Excellent presentation skills, subject matter knowledge, and command of the environment.
Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect.
Student
Click here to print this page »
Prerequisites
A CHFI candidate should have experience with Windows and/or UNIX/LINUX operating systems, and knowledge of TCP/IP and networking. CEH certification is strongly recommended.
Detailed Class Syllabus
Course Objectives
Learning about law and computer forensics in today's world
Learning how the computer investigation process and security incident response team work
Computer forensic laboratory requirements
Understanding file systems and hard disks
Windows forensics
Linux and Macintosh boot processes
Linux forensics
Data acquisition and duplication
Recovering deleted files
Image files forensics
Steganography
Computer forensic tools
Application password crackers
Investigating logs and network traffic
Router forensics
Investigating web attacks and email crimes, tracking email
Mobile and PDA forensics
Investigating trademark and copyright infringement
Learning about investigative reports and becoming an expert witness
Forensics in action
Course Outline
Day 1
Module I: Computer Forensics in Today's World
Module II: Law and Computer Forensics
Module II: Law and Computer Forensics
Module III: Computer Investigation Process
Module IV: Computer Security Incident Response Team
Module V: Computer Forensic Laboratory Requirements
Day 2
Module VI: Understanding File Systems and Hard Disks
Module VII: Windows Forensics
Module VIII: Linux and Macintosh Boot
Module IX: Linux Forensics
Module XX: Data Acquisition and Duplication
Day 3
Module XI: Recovering Day Deleted Files
Module XII: Image Files Forensics
Module XIII: Steganography
Module XIV: Computer Forensic Tools
Module XV: Application Password Crackers
Day 4
Module XVI: Investigating Logs
Module XVII: Investigating Network Traffic
Module XVIII: Router Forensics
Module XIX: Investigating Web Attacks
Module XX: Tracking Emails and Investigating Email crimes
Day 5
Module XXI: Mobile and PDA Forensics
Module XXII: Investigating Trademark and Copyright Infringement
Module XXIII: Investigative Reports
Module XIV: Becoming an Expert Witness
Module XXV: Forensics in Action