StudyITonline logoStudy Image
Products/Courses List

CHFI - Computer Hacking Forensics Investigator

EC Council's CHFI: Computer Hacking Forensics Investigator certification training course from Study IT Online provides students with the necessary training to identify a hacker or intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. Computer Hacking Forensic Investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. With the CHFI certification, you will begin to understand the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.

Study IT Online's CHFI training course will immerse the student into an interactive environment where they will trace the tracks of a hacker through a client’s systems, trace the originator of defamatory emails, and recover signs of fraud.  Students will learn CHFI investigation methods for discovering data that resides in a computer system and recovering deleted, encrypted, or damaged file information. CHFI is a vendor-neutral certification that validates knowledge in securing and analyzing electronic evidence. 

Study IT Online is an EC-Council Authorized Training Provider for online training, ensuring our course follows the approved curriculum and you receive the training and knowledge needed to succeed. Study IT Online is so certain this course meets and exceeds the exam objectives, we guarantee you will pass your exam!

 Course Duration: 3 Months
Learning segments

CHFI: Computer Hacking Forensics Investigator

Module 01: Computer Forensics in Today's World

Module 02-03: Computer Forensics Investigation Process

Module 04: Digital Evidence

Module 05: First Responder Procedures

Module 06: Computer Forensics Lab

Module 07: Understanding Hard Disks and File Systems

Module 08: Windows Forensics

Module 09: Data Acquisition and Duplication

Module 10: Recovering Deleted Files and Deleted Partitions

Module 11 - 12: Using AccessData FTK

Module 13: Steganography and Image File Forensics

Module 14: Application Password Crackers

Module 15: Log Capturing and Event Correlation

Module 16: Network Forensics and Investigating Network Traffic

Module 17: Investigating Wireless Attacks

Module 18: Investigating Web Attacks

Module 19: Tracking Emails and Investigating Email Crimes

Module 20: Mobile Forensics

Module 21: Investigative Reports

Module 22: Becoming an Expert Witness

Module 23: Lab

NB :

For More Information Email us at

Credit cards we accept

Free Catalogue Download

Please fill in your details below and click the submit link.

Email Address: A value is required.Invalid format.

Free Career Path Download

Please fill in your details below and click the submit link.

Email Address: A value is required.Invalid format.