Menu

Computer Hacking Forensic Investigator (CHFIv9)

Level
Advanced
Duration
40 hours
Course Fee
₹15000
*Inclusive of GST   

CHFI investigators will possess necessary skills to excel in incident handling and investigate various types of security incidents such as data breaches, latest persistent security issues, insider employee threats and intricate digital forensic circumstances and cases. CHFI certified professional will be able to develop effective security policy in the company.

Training Type
Classroom Online Corporate
Batch Timings

For the latest training schedule, please check the Schedules.

Weekdays
  • Early Morning
  • Morning
  • Afternoon
  • Evening
  • Fastrack
Weekdays
  • Morning
  • Afternoon
  • Evening
  • Sat / Sun
  • Sunday Only

Training is available in small groups as well as on one-to-one basis. Get in touch.

Computer Hacking Forensic Investigator (CHFIv9)

Level
Advanced
Duration
40 hrs.
Course Fee
₹15000

CHFI investigators will possess necessary skills to excel in incident handling and investigate various types of security incidents such as data breaches, latest persistent security issues, insider employee threats and intricate digital forensic circumstances and cases. CHFI certified professional will be able to develop effective security policy in the company.

Training Type
Classroom Online Corporate
Batch Timings

For the latest training schedule, please check the Schedules.

Weekdays
  • Early Morning
  • Morning
  • Afternoon
  • Evening
  • Fastrack
Weekdays
  • Morning
  • Afternoon
  • Evening
  • Sat / Sun
  • Sunday Only

Training is available in small groups as well as on one-to-one basis. Get in touch.

Course Introduction

Cyber war has begun, and we can also see the consequences in our daily lives. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in present day. If your organization requires the knowledge or skills to identify, track and prosecute the cyber criminals, then CHFI is the course for you.

If your reading this course outline, it is quite possible to understand the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct the audits to prevent future attacks. CHFI presents detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering all possible forensic investigations techniques and standard forensic tools necessary to carryout a computer forensic investigation leading to prosecution of perpetrators.

CHFI investigators will possess necessary skills to excel in incident handling and investigate various types of security incidents such as data breaches, latest persistent security issues, insider employee threats and intricate digital forensic circumstances and cases. CHFI certified professional will be able to develop effective security policy in the company.

The CHFIv9 course consists of 14 core sub-modules designed to facilitate a comprehensive computer hacking and forensic investigation training.

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Data Acquisition and Duplication
  • Defeating Anti-Forensics Techniques
  • Operating System Forensics
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating Email Crimes
  • Mobile Forensics
  • Forensics Reports Writing and Presentation
Course Highlights
  • Project manager can be assigned to track candidate’s performance
  • Curriculum based on course outlines defined by EC-COUNCIL.
  • This Instructor-led classroom course is designed with an aim to build theoretical knowledge supplemented by ample hands-on lab exercises
  • Facility of Lab on cloud available (based on booking)
  • Courseware includes reference material to maximize learning.
  • Assignments and test to ensure concept absorption.
  • Courseware includes reference material to maximize learning.
  • Assignments and test to ensure concept absorption.
  • Repeating of lectures allowed (based on seat availability)
Course Objectives
  • Perform incidence response and forensics.
  • Perform electronic evidence collection.
  • Perform digital forensics acquisitions.
  • Perform Bit Stream Imaging/Acquiring of the Digital Media Seized during the process of Investigation.
  • Examine and Analyze text, graphics, multimedia and digital images
  • Conduct thorough examinations of computer hard disk drives and other electronic data storage media
  • Recover information and electronic data from computer hard drives and other data storage devices
  • Follow strict data and evidence handling procedures
  • Maintain audit trail (i.e., chain of custody) and/or evidence of integrity
  • Work on technical examinations, analysis and reporting of computer-based evidence
  • Prepare and maintain case files
  • Utilize forensic tools and investigate methods to find electronic data, including internet use history, word processing documents, images and other files
Course Topics

The CHFIv9 course consists of 14 core sub-modules designed to facilitate a comprehensive computer hacking and forensic investigation training.

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Data Acquisition and Duplication
  • Defeating Anti-Forensics Techniques
  • Operating System Forensics
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating Email Crimes
  • Mobile Forensics
  • Forensics Reports Writing and Presentation
Lab Topics

Not Available


Virtual Classroom
  • Instructor led online training is an ideal vehicle for delivering training to individuals anywhere in the world at any time.
  • This innovative approach presents live content with instructor delivering the training online.
  • Candidates will be performing labs remotely on our labs on cloud in presence of an online instructor.
  • Rstforum uses microsoft lync engine to deliver instructor led online training.
  • Advances in computer network technology, improvements in bandwidth, interactions, chat and conferencing, and realtime audio and video offers unparalleled training opportunities.
  • Instructor led online training can helps today’s busy professionals to perform their jobs and upgrade knowledge by integrating self-paced instructor led online training in their daily routines.
Miscellaneous
  • Minimum batch size required for batch is 10 participants in the this course.
  • The RST Forum reserves the right to cancel/postpone the class.
  • Course schedule will be provided before commencement of the course.
  • Certificate of participation will be awarded to participants with a minimum 90% attendance.
  • All attendees are to observe the Copyright Law on intellectual properties such as software and courseware from respective vendors.
  • The RST Forum reserves the right to include external participants in the program either for the entire course or individual courses.
  • The RST Forum reserves the right to change/alter the sequence of courses. RST FORUM published Book would be given at 50% discounted rate to the forum students.