EC-Council CHFI: Computer Hacking Forensic Investigator v11

Course Details

Price:

$3,495.00

Days:

1

Location:

Virtual

Course Overview

– • Understand computer forensics fundamentals, different types of cybercrimes, and their investigation procedures, as well as regulations and standards that influence computer forensics investigations.
– • Learn the various phases involved in the computer forensics investigation process.
– • Gain knowledge of data acquisition fundamentals and methodology, eDiscovery, and how to prepare image files for forensics examination.
– • Explore various anti-forensics techniques used by attackers, different ways to detect them, related tools, and countermeasures.
– • Conduct volatile and non-volatile data acquisition in Windows-based operating systems, including Windows memory and registry analysis, electron application analysis, web browser forensics, and examination of Windows files, ShellBags, LNK files, Jump Lists, and Windows event logs.
– • Perform volatile and non-volatile data acquisition and memory forensics in Linux and Mac operating systems.
– • Understand malware forensics concepts, including static and dynamic malware analysis, system and network behavior analysis, and ransomware analysis.
– • Learn the working methodology of the Tor browser and the steps involved in the Tor browser forensics process.
– • Explore cloud computing concepts, cloud forensics, challenges, and the fundamentals of AWS, Microsoft Azure, and Google Cloud and their investigation processes.
– • Understand components in email communication, steps involved in email crime investigation, and social media forensics.
– • Identify different types of IoT threats, security problems, vulnerabilities, attack surface areas, and the IoT forensics process and challenges.
– • Learn about architectural layers and boot processes of Android and iOS devices, mobile forensics processes, various cellular networks, SIM file systems, and logical and physical acquisition of Android and iOS devices.
– • Explore web application forensics and challenges, web application threats and attacks, web application logs (IIS logs, Apache web server logs, etc.), and how to detect and investigate various web application attacks.
– • Understand network forensics fundamentals, event correlation concepts, Indicators of Compromise (IOCs), and ways to identify them from network logs, as well as techniques and tools related to network traffic investigation, incident detection and examination, and wireless attack detection and investigation.
– • Learn about different types of disk drives and their characteristics, the booting process and file systems in Windows, Linux, and Mac operating systems, file system examination tools, RAID and NAS/SAN storage systems, various encoding standards, and file format analysis.

No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.

• Computer Forensics in Today’s World
• Computer Forensics Investigation Process
• Understanding Hard Disks and File Systems
• Data Acquisition and Duplication
• Defeating Anti-forensics Techniques
• Windows Forensics
• Linux and Mac Forensics
• Network Forensics
• Malware Forensics
• Investigating Web Attacks
• Dark Web Forensics
• Cloud Forensics
• Email and Social Media Forensics
• Mobile Forensics
• IoT Forensics

Class Dates & Times
Filters Sort results
Reset Apply
5/19/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,495.00
6/23/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,495.00
7/21/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,495.00
8/18/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,495.00
9/22/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,495.00
10/20/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,495.00
11/17/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,495.00
12/15/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$3,495.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.