Description
The purpose of the Computer Hacking Forensic Investigator (CHFI) v9 credential is to:
Validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.
About the Program
Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cybersecurity profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors.
In the event of a cyber-attack or incident, it is critical investigations be carried out in a manner that is forensically sound to preserve evidence in the event of a breach of the law. Far too many cyber-attacks are occurring across the globe where laws are clearly broken and due to improper or non-existent forensic investigations, the cybercriminals go either unidentified, undetected, or are simply not prosecuted.
Cyber Security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams. The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. CHFI provides its attendees with a firm grasp on the domains of digital forensics.
WHAT’S NEW IN CHFI V9
- 14 comprehensive modules and 39 labs
- More than 40 percent of new labs
- More than 400 new/updated tools
- Classroom friendly curriculum with diagrammatic representation of concepts and examples
- New and rich presentation style with eye catching graphics
- Coverage of latest operating systems
- Updated patch management and testing environment
- Well tested, result oriented, descriptive and analytical lab manual to evaluate the presented concepts
Course Outline
Module 1: Computer Forensics in Today’s World
Module 2: Computer Forensics Investigation Process
Module 3: Understanding Hard Disks and File Systems
Module 4: Operating System Forensics
Module 5: Defeating Anti-Forensics Techniques
Module 6: Data Acquisition and Duplication
Module 7: Network Forensics
Module 8: Investigating Web Attacks
Module 9: Database Forensics
Module 10: Cloud Forensics
Module 11: Malware Forensics
Module 12: Investigating Email Crimes
Module 13: Mobile Forensics
Module 14: Investigative Reports
Who Is It For?
The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.
Target Audience:
- Police and other law enforcement personnel
- Defense and Military personnel
- e-Business Security professionals
- Systems administrators
- Legal professionals
- Banking, Insurance and other professionals
- Government agencies
- IT managers
Training Duration:
5 Days (9:00 AM – 6:00 PM)
About the Exam
- Exam Title: Computer Hacking Forensic Investigator
- Exam Code: 312-49
- Number of Questions: 150
- Duration: 4 Hours
- Availability: ECC Exam Portal
- Test Format: Interactive Multiple Choice Questions
- Passing Score: 70%
In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigour but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 78%.
Eligibility Criteria:
- IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response
- Prior completion of CEH training would be an advantage
Reviews
There are no reviews yet.