Discover Classes. Earn 10% Rewards.

Computer Hacking Forensics Investigator (CHFI) V10.0 is unfortunately unavailable

Thankfully we have 670 other Tech Classes for you to choose from. Check our top choices below or see all classes for more options.

Microsoft Excel Bootcamp

NYC Career Centers See all classes by this school - Virtually Online

Master all aspects of Microsoft Excel in just three days with the comprehensive Excel Bootcamp. This intensive course covers everything from basic calculations and tables to advanced spreadsheet features and automation with macros. Take your Excel skills to the next level and become an expert user in no time.

(683) All levels 18 and older
$549

3 sessions

Gift it!

Graphic Design Certificate

Noble Desktop See all classes by this school - Virtually Online

Learn the Adobe Creative Cloud apps used by professionals and master graphic design concepts to create stunning modern designs and build an impressive portfolio that showcases your skills to prospective clients or employers.

(441) All levels 18 and older
$2,995

26 sessions

Gift it!

SQL Bootcamp

NYC Career Centers See all classes by this school - Virtually Online

Master the art of extracting actionable insights from databases with the SQL Bootcamp. Learn Microsoft SQL Server, join tables, aggregate data, and filter results in this hands-on course. Gain the skills needed to turn raw data into valuable insights for decision-making in any industry.

(683) All levels 18 and older
$975

3 sessions

Gift it!

Adobe Photoshop Bootcamp

Noble Desktop See all classes by this school - Virtually Online

Enhance your photos and create stunning graphics with this comprehensive Photoshop course. From removing unwanted elements to making precise selections, you'll master essential techniques to transform your images. Unleash your creativity and learn from industry experts.

(441) All levels 18 and older
$975

3 sessions

Gift it!

Data Analytics Certificate

Noble Desktop See all classes by this school - Virtually Online

Gain in-demand skills in data analysis, visualization, and database management to become a sought-after Data Analyst or Business Analyst. Learn to extract information from raw data and generate actionable insights for industries like healthcare, finance, retail, and more. Advance your career in analytics with real-world projects and hands-on training.

(441) All levels 18 and older
$4,995

25 sessions

Gift it!
See all Tech classes Online

Computer Hacking Forensics Investigator (CHFI) V10.0

Uncover the intricate world of digital forensics with an ANSI-accredited program focused on equipping IT professionals with the skills to investigate cybercrimes effectively. Delve into a comprehensive curriculum covering topics such as anti-forensics techniques, network forensics, dark web investigations, and IoT forensics, empowering you to proactively combat evolving cybersecurity threats.

  • All levels
  • Small class sizes
  • 18 and older
  • $3,495
  • Earn 10% Rewards
  • Price Lock
  • Online Classroom
  • 40 hours over 5 sessions

Start Dates (0)

  • $3,495/person
  • 40 hours over 5 sessions
Showing 10 of 0

Class Description

Description

EC-Council’s Certified Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.

Course Objectives

The program is designed for IT professionals involved with information system security, computer forensics, and incident response. It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.

Who Should Attend?

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

Course Prerequisites

EC-Council Certified Ethical Hacker (CEH) v11

Course Outline

1 - Computer Forensics in Today’s World

  • Understand the Fundamentals of Computer Forensics
  • Understand Cybercrimes and their Investigation Procedures
  • Understand Digital Evidence
  • Understand Forensic Readiness, Incident Response and the Role of SOC (Security
  • Operations Center) in Computer Forensics
  • Identify the Roles and Responsibilities of a Forensic Investigator
  • Understand the Challenges Faced in Investigating Cybercrimes
  • Understand Legal Compliance in Computer Forensics

2 - Computer Forensics Investigation Process

  • Understand the Forensic Investigation Process and its Importance
  • Understand the Pre-investigation Phase
  • Understand First Response
  • Understand the Investigation Phase
  • Understand the Post-investigation Phase

3 - Understanding Hard Disks and File Systems

  • Describe Different Types of Disk Drives and their Characteristics
  • Explain the Logical Structure of a Disk
  • Understand Booting Process of Windows, Linux and Mac Operating Systems
  • Understand Various File Systems of Windows, Linux and Mac Operating Systems
  • Examine File System Using Autopsy and The Sleuth Kit Tools
  • Understand Storage Systems
  • Understand Encoding Standards and Hex Editors
  • Analyze Popular File Formats Using Hex Editor

4 - Data Acquisition and Duplication

  • Understand Data Acquisition Fundamentals
  • Understand Data Acquisition Methodology
  • Prepare an Image File for Examination

5 - Defeating Anti-forensics Techniques

  • Understand Anti-forensics Techniques
  • Discuss Data Deletion and Recycle Bin Forensics
  • Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
  • Explore Password Cracking/Bypassing Techniques
  • Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
  • Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
  • Detect Program Packers and Footprint Minimizing Techniques
  • Understand Anti-forensics Countermeasures

6 - Windows Forensics

  • Collect Volatile and Non-volatile Information
  • Perform Windows Memory and Registry Analysis
  • Examine the Cache, Cookie and History Recorded in Web Browsers
  • Examine Windows Files and Metadata
  • Understand ShellBags, LNK Files, and Jump Lists
  • Understand Text-based Logs and Windows Event Logs

7 - Linux and Mac Forensics

  • Understand Volatile and Non-volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Demonstrate Memory Forensics Using Volatility & PhotoRec
  • Understand Mac Forensics

8 - Network Forensics

  • Understand Network Forensics
  • Explain Logging Fundamentals and Network Forensic Readiness
  • Summarize Event Correlation Concepts
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
  • Perform Incident Detection and Examination with SIEM Tools
  • Monitor and Detect Wireless Network Attacks

9 - Investigating Web Attacks

  • Understand Web Application Forensics
  • Understand Internet Information Services (IIS) Logs
  • Understand Apache Web Server Logs
  • Understand the Functionality of Intrusion Detection System (IDS)
  • Understand the Functionality of Web Application Firewall (WAF)
  • Investigate Web Attacks on Windows-based Servers
  • Detect and Investigate Various Attacks on Web Applications
  • 10 - Dark Web Forensics
  • Understand the Dark Web
  • Determine How to Identify the Traces of Tor Browser during Investigation
  • Perform Tor Browser Forensics

11 - Database Forensics

  • Understand Database Forensics and its Importance
  • Determine Data Storage and Database Evidence Repositories in MSSQL Server
  • Collect Evidence Files on MSSQL Server
  • Perform MSSQL Forensics
  • Understand Internal Architecture of MySQL and Structure of Data Directory
  • Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis

12 - Cloud Forensics

  • Understand the Basic Cloud Computing Concepts
  • Understand Cloud Forensics
  • Understand the Fundamentals of Amazon Web Services (AWS)
  • Determine How to Investigate Security Incidents in AWS
  • Understand the Fundamentals of Microsoft Azure
  • Determine How to Investigate Security Incidents in Azure
  • Understand Forensic Methodologies for Containers and Microservices

13 - Investigating Email Crimes

  • Understand Email Basics
  • Understand Email Crime Investigation and its Steps
  • U.S. Laws Against Email Crime

14 - Malware Forensics

  • Define Malware and Identify the Common Techniques Attackers Use to Spread Malware
  • Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis
  • Understand and Perform Static Analysis of Malware
  • Analyze Suspicious Word and PDF Documents
  • Understand Dynamic Malware Analysis Fundamentals and Approaches
  • Analyze Malware Behavior on System Properties in Real-time
  • Analyze Malware Behavior on Network in Real-time
  • Describe Fileless Malware Attacks and How they Happen
  • Perform Fileless Malware Analysis - Emotet

15 - Mobile Forensics

  • Understand the Importance of Mobile Device Forensics
  • Illustrate Architectural Layers and Boot Processes of Android and iOS Devices
  • Explain the Steps Involved in Mobile Forensics Process
  • Investigate Cellular Network Data
  • Understand SIM File System and its Data Acquisition Method
  • Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices
  • Perform Logical Acquisition on Android and iOS Devices
  • Perform Physical Acquisition on Android and iOS Devices
  • Discuss Mobile Forensics Challenges and Prepare Investigation Report

16 - IoT Forensics

  • Understand IoT and IoT Security Problems
  • Recognize Different Types of IoT Threats
  • Understand IoT Forensics
  • Perform Forensics on IoT Devices

Remote Learning

This course is available for "remote" learning and will be available to anyone with access to an internet device with a microphone (this includes most models of computers, tablets). Classes will take place with a "Live" instructor at the date/times listed below.

Upon registration, the instructor will send along additional information about how to log-on and participate in the class.

Refund Policy

Cancellation / Reschedule by Student

Because we must schedule rooms, ship course materials, assign instructors and provision computer resources well in advance, it is important students alert us ASAP with any cancel/reschedule requests.

Please note the following policies:

  • If requested 16 or more calendar days before the class
    • Cancellation requests made in this timeframe are eligible for refund less 5% cancellation fee.
    • Reschedule requests made in this timeframe will be accommodated if availability exists and will be processed at no additional charge.
  • If requested 15 calendar days or less before the class
    • Cancellation or Reschedule requests made by the student 15 calendar days or less before the class starts will be charged 100% the course fee and are not entitled to a refund.

Substitutions

  • If you are unable to attend your class, a substitute who meets the course prerequisites may attend in your place at no additional charge for the original class title, date and location. If you cannot find a substitute, you will be subject to the class cancellation policy.

Make-up Policy

Students are permitted one (1) Make-Up opportunity to attend an instructor-led class that was paid for but not previously attended for no additional charge.

  • Make-Up class registrations are subject to availability and are not entitled to refund.
  • Students may not reschedule a Make-up class registration.
  • Any no shows or cancellations forfeit their one Make-up opportunity.

Additionally, ONLC reserves the right to retire courses due to lack of demand. Retired classes are not available for Make-Up.

In the event that an instructor or the school needs to cancel at the last minute, students will receive a refund less a 5% non-refundable registration fee.

In any event where a customer wants to cancel their enrollment and is eligible for a full refund, a 5% processing fee will be deducted from the refund amount.

Reviews of Classes at ONLC Training Centers (8)

Benefits of Booking Through CourseHorse

  • Booking is safe. When you book with us your details are protected by a secure connection.
  • Lowest price guaranteed. Classes on CourseHorse are never marked up.
  • This class will earn you 34950 points. Earn 10% back in reward points!

ONLC Training Centers

ONLC Training Centers was founded in 1983 when Jim Palic and Andy Williamson left their positions as mainframe programmers with the Dupont Company to start one of the industry's first computer training companies.

Over thirty years and still growing, ONLC Training Centers is one of the the largest privately...

Read more about ONLC Training Centers

CourseHorse Approved

This school has been carefully vetted by CourseHorse and is a verified Online educator.

ONLC Training Centers

Give This Course as a Gift Card

  • Thousands of classes
  • No expiration
  • Unique and memorable gifts for any occasion
  • Personalized
  • Explore a passion, gain a new skill, discover a new hobby, engage in a memorable experience
  • Instant delivery
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™

Buy a Gift Card

Book this Class as a Group Event

Booking this class for a group? Find great private group events

Or see all Professional Group Events

Explore group events and team building activities ranging from cooking, art, escape rooms, trivia, and more.

CourseHorse Gift Cards

  • Creative & unique gift for any occasion
  • Thousands of classes & experiences
  • No expiration date
  • Instant e-delivery (or choose a date)
  • Add a personalized message
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™
Buy a Gift Card
gift card with the CourseHorse logo gift card with the CourseHorse logo
Loading...