Computer Hacking Forensic Investigator (CHFI)
Original price was: ₹9,999.00.₹8,999.00Current price is: ₹8,999.00.
Description
The Computer Hacking Forensic Investigator (CHFI) course is designed for individuals aiming to pursue a career in Digital Forensics or Computer Forensics. This comprehensive program covers advanced data acquisition techniques and data retrieval methods in a forensically sound manner. You will learn how to collect, analyze, and present digital evidence that can withstand legal scrutiny in a court of law. Through real-time demonstrations of modern forensic techniques, methodologies, tools, and tricks, this course will equip you with the knowledge to handle evidence safely and effectively.
Prerequisites:
- Basic computer knowledge
- Understanding of ethical hacking concepts
Key Learning Outcomes:
By completing this course, you will be able to:
- Acquire and retrieve data from different types of evidence media in a forensically sound manner.
- Understand the technicalities and methodologies involved in digital evidence collection.
- Apply forensic tools and techniques for effective data analysis and reporting.
- Present digital evidence in court while maintaining its integrity.
- Handle and safeguard digital evidence from various hacking and cybercrime-related cases.
Target Audience:
This course is ideal for:
- Students looking to work in top-tier IT companies such as TCS, Infosys, Microsoft, Samsung, Google, Amazon, Facebook, Wipro, and other leading MNCs.
- Individuals pursuing a career in digital or computer forensics.
- M.Tech/B.Tech/MCA/BCA graduates or any diploma holders interested in the field of computer forensics.
Test & Evaluation:
- Assignments: Participants are required to complete assignments throughout the course to enhance their learning.
- Final Assessment: A final assessment will be conducted at the end of the course to evaluate the participant’s understanding of the concepts.
Certification:
- Successful participants will receive a Certificate of Completion.
- A Project Letter will be awarded upon the successful completion of the project.
- Students who leave the course midway or do not complete it will not receive any certification.
Delivery Mode & Duration:
Mode: Online Live Sessions
Duration: 6 Weeks @1.5hr/ Day x 5 Days
EC-Council Description:
RCPL proudly partners with EC-Council (International Council of E-Commerce Consultants), a globally recognized leader in cybersecurity certification and training with over 20 years of industry excellence and a presence in 150+ countries. The organization has certified more than 4,00,000 professionals worldwide and is best known for its industry-recognized credentials such as the Certified Ethical Hacker (CEH), CHFI and CCISO. EC-Council certifications empower individuals and organizations to build practical, job-ready cybersecurity skills and are trusted by enterprises, governments and security professionals across the globe.
Faculty Profile – Mr. R. Gupta
Mr. R. Gupta, a Licensed Penetration Tester – Master and Microsoft Certified Trainer, will serve as the lead instructor for this course. With over 18 years of experience in Cybersecurity, his expertise spans Ethical Hacking, Penetration Testing, Digital Forensics, Networking, Linux and Cloud Security (AWS & Azure). He has trained thousands of students and professionals across corporate, government, defence and academic sectors. Mr. Gupta is widely recognized for his deep expertise in cyber defense, incident response, enterprise security and hands-on technical training delivery.
Module 1: Introduction to Networking:
- OSI Model
- TCP/IP Model
- IP Addressing
- CIDR
- Application Layer Protocols
Module 2 – Computer Forensics in Today’s World
- Understanding Computer Forensics
- Cyber Crime (Types of Computer Crimes)
- Cyber Crime Investigation
- Rules of Forensics Investigation
- Understanding Digital Evidence
- Rules of Evidence
- Forensics Readiness
Module 3 – Computer Forensics Investigation Process
- Phases Involved in the Computer Forensics Investigation Process
- Pre-investigation Phase
- Investigation Phase
- Post-investigation Phase
Module 4 – Understanding Hard Disks and File Systems
- Hard Disk Drive Overview
- Disk Partitions and Boot Process
- Understanding File Systems
- RAID Storage System
- File System Analysis
Module 5 – Data Acquisition and Duplication
- Data Acquisition and Duplication Concepts
- Static Acquisition
- Validate Data Acquisitions
Module 6 – Defeating Anti-forensics Techniques
- Anti-Forensics techniques
- Password Protection
- Recovering the Deleted Partitions
- Steganography
- Steganalysis
- Artifact Wiping
Module 7 – Windows OS Forensics
- Windows Forensics
- Memory Analysis
- Registry Analysis
Module 8 – Linux and MAC Forensics
- Linux Forensics
- MAC Forensics
Module 9 – Network Forensics
- Introduction to Network Forensics
- Fundamental Logging Concepts
- Event Correlation Concepts
- Network Forensic Readiness
- Network Traffic Investigation
- Documenting the Evidence
- Evidence Reconstruction
Module 10 – Investigating Web Attacks
- Web Attack Investigation
- Investigating Web Server Logs
- Tools for Locating IP Address
Module 11 – Database Forensics
- MSSQL Forensics
- MySQL Forensics
Module 12 – Cloud Forensics
- Usage of Cloud Forensics
- Stakeholders and their Roles
- Investigating Cloud Storage Services
Module 13 – Malware Forensics
- Malware Analysis: Static
- Malware Analysis: Dynamic
- Analysis of Malicious Documents
- Malware Analysis Challenges
Module 14 – Investigating Email Crimes
- Email System
- Email Crimes (Email Spamming, Mail Bombing/Mail Storm, Phishing, Email Spoofing, Crime via Chat Room, Identity Fraud/Chain Letter)
- Steps to Investigate Email Crimes and Violation
- Examine E-mail Messages
- Laws and Acts against Email Crimes
Module 15 – Mobile Phone Forensics
- Mobile Forensics Process
- Forensics Imaging
- Platform Security Removal Techniques: Jailbreaking/Rooting
- Android Forensics Analysis
Module 16 – IOT Forensics
- IoT Devices Attack Vectors
- IoT Devices Forensic Process
Module 17 – Dark Web Forensics
- Dark Web Forensics
- Tor Browser Investigation
- Checking Files
You can also give us a call on Mobile +91-9312889010





