Course Overview
High-level description: The Computer Hacking Forensics Investigator (CHFI) certification blended bundle program is designed to equip IT professionals with the skills to identify, track, and prosecute cybercriminals. This course covers the forensic investigation process, tools, and techniques used to gather and analyze digital evidence. It includes ITI’s customer CHFI Self-Paced Online ILT course and labs, as well as EC-Council’s official live and self-paced CHFI course, in addition to their online self-paced Mobile Forensics, Malware and Memory Forensics, and Dark Web courses:
Course Delivery:
- Official EC-Council CHFI: Live Online ILT (Contact us to schedule)
- Official EC-Council CHFI: Self-paced Online ILT
- Official EC-Council Certified Incident Handler (ECIH): Self-paced Online ILT
- Official EC-Council Mobile Forensics: Self-paced Online ILT
- Official EC-Council Malware and Memory Forensics: Self-paced Online ILT
- Official EC-Council Dark Web: Self-paced Online ILT
- ITI Custom CHFI: Self-paced Online ILT
Duration:
- Official EC-Council CHFI (Live): 5 Days
- Official EC-Council CHFI (Self-paced): 5 Days
- Official EC-Council Certified Incident Handler: 3 Days
- Official EC-Council Mobile Forensics: 1 Day
- Official EC-Council Malware and Memory Forensics: 1 Day
- Official EC-Council Dark Web: 1 Day
- ITI Custom CHFI: ~4 days (30+ hours)
- ITI Custom CEH: ~7 days (70+ hours)
ITI Custom CHFI Course Description: Our CHFI course will cover the security discipline of computer forensics from a vendor-neutral perspective and work towards preparing students to become Forensic Investigators in Computer Hacking.
Topics Covered (18+ hours):
- Comprehensive understanding of computer forensics and the forensic investigation process.
- Techniques for searching and seizing digital evidence.
- Methods for analyzing and handling digital evidence.
- First responder procedures for incident management.
- Setup and operation of a forensic lab.
- Gain in-depth knowledge of hard disks, file systems, and Windows forensics.
- Data acquisition and duplication techniques.
- Recovering deleted files and partitions.
- Utilizing Access Data FTK and EnCase for forensic investigations.
- Understanding and applying steganography and password cracking techniques.
- Log correlation, network forensics, and analyzing wireless and web attacks.
- Investigating email crimes and conducting mobile investigations.
- Preparing investigative reports and serving as an expert witness.
Labs included (12+ hours):
- Understanding the Digital Forensics Profession and Investigations
- Data Acquisition
- Processing Crime and Incident Scenes
- Working with Windows and CLI Systems
- Current Digital Forensics Tools
- Linux and Macintosh File Systems
- Recovering Graphics Files
- Digital Forensics Analysis and Validation
- Virtual Machine Forensics, Live Acquisitions, and Network Forensics
- E-mail and Social Media Investigations
- Mobile Device Forensics
- Cloud Forensics
- Report Writing for High-Tech Investigations
- Expert Testimony in Digital Investigations
- Ethics for the Expert Witness
ITI Custom CEH Course Description: Our course offers CEH training to provide you with the tools to research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this CEH online training course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed.
Topics Covered:
- Introduction to the key concepts of ethical hacking and information security.
- Conducting footprinting and reconnaissance using advanced tools and techniques.
- Scanning networks and identifying vulnerabilities.
- Performing system hacking and exploiting operating systems.
- Understanding malware threats and implementing countermeasures.
- Utilizing social engineering techniques and tools.
- Executing Denial-of-Service (DoS) and session hijacking attacks.
- Evading IDS, firewalls, and honeypots.
- Hacking web servers and applications.
- Performing SQL injection and securing databases.
- Hacking wireless networks and mobile platforms.
- Exploring IoT and OT hacking methodologies.
- Securing cloud environments and implementing cryptographic techniques.
Labs included (15 hours):
- Footprinting and Reconnaissance Techniques
- Network Reconnaissance Techniques
- Enumeration Reconnaissance Techniques
- Vulnerability Analysis Tools & Techniques
- System Hacking Methodologies
- Malware Threat Concepts
- Network Sniffing Techniques
- Social Engineering Exploits
- Denial of Service Attacks
- Session Hijacking Concepts
- Compromising Web Servers
- Web Application Hacking
- SQL Injection Methodologies
- Introduction to Cloud Computing
- Cryptography Techniques
Official EC-Council CHFI Course Description: Enhance your investigative skills with the CHFI course, which provides 40 hours of content focusing on digital forensics. This course covers the essentials of computer forensics, including the investigation process, tools, and techniques for analyzing digital evidence.
Topics Covered:
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Operating System Forensics
- Network Forensics
- Investigating Web Attacks
- Database Forensics
- Cloud Forensics
- Malware Forensics
- Investigative Reports
Mobile Forensics:
Gain expertise in performing forensic investigations on mobile devices. This course covers data acquisition, analysis, and recovery techniques specific to mobile platforms, ensuring thorough and accurate investigations.
Topics Covered:
- Introduction to Mobile Forensics
- Understanding Mobile Device Architecture
- Data Acquisition from Mobile Devices
- Analyzing Mobile Device Data
- Mobile Forensics Tools and Techniques
- Recovering Deleted Data from Mobile Devices
- Mobile Application Forensics
- Reporting and Documentation
Malware and Memory Forensics:
Learn advanced techniques to analyze and investigate malware within system memory. This course provides deep insights into identifying malicious activities and understanding the impact of malware on system memory.
Topics Covered:
- Fundamentals of Malware Forensics
- Memory Acquisition and Analysis
- Identifying Malicious Code in Memory
- Techniques for Memory Forensics
- Analyzing Memory Artifacts
- Tools for Malware and Memory Forensics
- Investigating Memory-based Attacks
- Reporting and Documentation
Dark Web:
Understand the complexities of the Dark Web, including how to navigate, investigate, and analyze activities within this hidden part of the internet. This course equips you with the skills needed to perform investigations and gather intelligence from the Dark Web.
Topics Covered:
- Introduction to the Dark Web
- Navigating the Dark Web
- Understanding Dark Web Marketplaces
- Tools and Techniques for Dark Web Investigations
- Collecting Intelligence from the Dark Web
- Analyzing Dark Web Activities
- Dark Web Forensics Tools
- Reporting and Documentation
Exam Information: The courses include exam voucher. The EC-Council exams can be taken online through the EC-Council’s remote proctoring service or at authorized testing centers. The CHFI does come with an exam retake (additional voucher if needed)
License Information: One license provides access to all courses for 12 months. Access keys must be redeemed within 12 months of purchase.
How to Access: Instructions for accessing the course will be emailed after purchase.