EC-Council Computer Hacking Forensic Investigator (CHFI)

 

Course Overview

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

The CHFI certification gives participants (Law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.) the necessary skills to perform an effective digital forensics investigation.

CHFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

Who should attend

  • Anyone interested in cyber forensics/investigations
  • Attorneys, legal consultants, and lawyers
  • Law enforcement officers
  • Police officers
  • Federal/ government agents
  • Defense and military
  • Detectives/ investigators
  • Incident response team members
  • Information security managers
  • Network defenders
  • IT professionals, IT directors/ managers
  • System/network engineers
  • Security analyst/ architect/ auditors/ consultants

Prerequisites

Course Objectives

  • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
  • Perform anti-forensic methods detection
  • Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
  • Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
  • Identify & check the possible source / incident origin.
  • Recover deleted files and partitions in Windows, Mac OS X, and Linux
  • Conduct reverse engineering for known and suspected malware files
  • Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Prezzo & Delivery methods

Online Training

Durata
5 Giorni

Prezzo
  • 3.950,– €
Formazione in Aula

Durata
5 Giorni

Prezzo
  • Italia: 3.950,– €

Schedulazione

Al momento non esistono edizioni in italiano.

Inglese

Fuso orario: Central European Time (CET)   ±1 Ora

Online Training Fuso orario: Central European Time (CET)
Online Training Fuso orario: Central European Summer Time (CEST)
Online Training Fuso orario: Central European Summer Time (CEST)
Online Training Fuso orario: Central European Time (CET)

5 ore spostamento del fuso orario

Online Training Fuso orario: Eastern Daylight Time (EDT)

6 ore spostamento del fuso orario

Online Training Fuso orario: Eastern Standard Time (EST)
Online Training Fuso orario: Eastern Daylight Time (EDT)
Instructor-led Online Training:   Questo è un corso Online
Questo è un corso FLEX, erogato sia in aula che in remoto, contemporaneamente.

Al momento non ci sono date italiane disponibili.

Europa

Svizzera

Zürich
Zürich
Zürich
Zürich
Zürich
Zürich

Germania

Krefeld
Monaco
Berlino
Amburgo
Questo è un corso FLEX, erogato sia in aula che in remoto, contemporaneamente.