Computer Hacking Forensic Investigator (CHFI)
Original price was: ₹7,900.00.₹6,900.00Current price is: ₹6,900.00.
Description
The Computer Hacking Forensic Investigator (CHFI) course is designed for individuals aiming to pursue a career in Digital Forensics or Computer Forensics. This comprehensive program covers advanced data acquisition techniques and data retrieval methods in a forensically sound manner. You will learn how to collect, analyze, and present digital evidence that can withstand legal scrutiny in a court of law. Through real-time demonstrations of modern forensic techniques, methodologies, tools, and tricks, this course will equip you with the knowledge to handle evidence safely and effectively.
Prerequisites:
- Basic computer knowledge
- Understanding of ethical hacking concepts
Key Learning Outcomes:
By completing this course, you will be able to:
- Acquire and retrieve data from different types of evidence media in a forensically sound manner.
- Understand the technicalities and methodologies involved in digital evidence collection.
- Apply forensic tools and techniques for effective data analysis and reporting.
- Present digital evidence in court while maintaining its integrity.
- Handle and safeguard digital evidence from various hacking and cybercrime-related cases.
Target Audience:
This course is ideal for:
- Students looking to work in top-tier IT companies such as TCS, Infosys, Microsoft, Samsung, Google, Amazon, Facebook, Wipro, and other leading MNCs.
- Individuals pursuing a career in digital or computer forensics.
- M.Tech/B.Tech/MCA/BCA graduates or any diploma holders interested in the field of computer forensics.
Test & Evaluation:
- Assignments: Participants are required to complete assignments throughout the course to enhance their learning.
- Final Assessment: A final assessment will be conducted at the end of the course to evaluate the participant’s understanding of the concepts.
Certification:
- Successful participants will receive a Certificate of Completion.
- A Project Letter will be awarded upon the successful completion of the project.
- Students who leave the course midway or do not complete it will not receive any certification.
Delivery Mode & Duration:
- Mode: Online Live Sessions
Duration: 120 Hours (60 Hours of Online Live Sessions + 60 Hours of Assignments)
Module 1: Introduction to Networking:
- OSI Model
- TCP/IP Model
- IP Addressing
- CIDR
- Application Layer Protocols
Module 2 – Computer Forensics in Today’s World
- Understanding Computer Forensics
- Cyber Crime (Types of Computer Crimes)
- Cyber Crime Investigation
- Rules of Forensics Investigation
- Understanding Digital Evidence
- Rules of Evidence
- Forensics Readiness
Module 3 – Computer Forensics Investigation Process
- Phases Involved in the Computer Forensics Investigation Process
- Pre-investigation Phase
- Investigation Phase
- Post-investigation Phase
Module 4 – Understanding Hard Disks and File Systems
- Hard Disk Drive Overview
- Disk Partitions and Boot Process
- Understanding File Systems
- RAID Storage System
- File System Analysis
Module 5 – Data Acquisition and Duplication
- Data Acquisition and Duplication Concepts
- Static Acquisition
- Validate Data Acquisitions
Module 6 – Defeating Anti-forensics Techniques
- Anti-Forensics techniques
- Password Protection
- Recovering the Deleted Partitions
- Steganography
- Steganalysis
- Artifact Wiping
Module 7 – Windows OS Forensics
- Windows Forensics
- Memory Analysis
- Registry Analysis
Module 8 – Linux and MAC Forensics
- Linux Forensics
- MAC Forensics
Module 9 – Network Forensics
- Introduction to Network Forensics
- Fundamental Logging Concepts
- Event Correlation Concepts
- Network Forensic Readiness
- Network Traffic Investigation
- Documenting the Evidence
- Evidence Reconstruction
Module 10 – Investigating Web Attacks
- Web Attack Investigation
- Investigating Web Server Logs
- Tools for Locating IP Address
Module 11 – Database Forensics
- MSSQL Forensics
- MySQL Forensics
Module 12 – Cloud Forensics
- Usage of Cloud Forensics
- Stakeholders and their Roles
- Investigating Cloud Storage Services
Module 13 – Malware Forensics
- Malware Analysis: Static
- Malware Analysis: Dynamic
- Analysis of Malicious Documents
- Malware Analysis Challenges
Module 14 – Investigating Email Crimes
- Email System
- Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
- Steps to Investigate Email Crimes and Violation
- Examine E-mail Messages
- Laws and Acts against Email Crimes
Module 15 – Mobile Phone Forensics
- Mobile Forensics Process
- Forensics Imaging
- Platform Security Removal Techniques: Jailbreaking/Rooting
- Android Forensics Analysis
Module 16 – IOT Forensics
- IoT Devices Attack Vectors
- IoT Devices Forensic Process
Module 17 – Dark Web Forensics
- Dark Web Forensics
- Tor Browser Investigation
- Checking Files
You can also give us a call on Mobile +91-9335469335





